Skip to main content

Full text of "PC Today Volume 7 Issue 1"

See other formats





Travel Web Sites & 
Business Travel m) 

Why Mobile Is 
Where It's At (p.?b) 


How You Can: 

• Stay Secure At Wi-Fi Hotspots 

• Protect Your Traveling Data I 

• Handle Internet & Cellular Threats 




For Her 

We all know what a hassle it is to get through the airport checkpoints with our laptops. 

Take them out of the case, run them through the x-rays in their own bins, etc. 

Woufdn r t you love to speed that process up? 

The TSA recently announced new guidelines that will allow travelers with properly designed carrying cases to 
pass through security checkpoints without having to remove their laptops. 

Mobile Edge has responded to this situation by creating the ScanFast Collection, each case is uniquely designed to 

provide an unobstructed security scan of the computer. If you're traveling with your laptop, let Mobile Edge make 

your trip through the airport faster and easier with the ScanFast Laptop Cases! 



Bring It On 



The website 

ClFve been wishing for, 

As the world's largest 
web host, 1&1 offers 
website plans for every 
skill level and budget. 

j-J Start your 
website today and 
get a Holiday Credit 

Offer ends December 31st! 

/r f ' 


Register your website today! 
Prices start at just $8.99/year. 


Up to a 
$50 credit!* 

Design your professional looking 
website. Starting at just $3.99/month. 


Up to a 
$100 credit!* 

Set up your own 

online store and start selling! Prices 

start at just $9.99/month. 

Up to a 
$300 credit!* 

Powerful hardware for high performance 
needs. Starting at $99.99/month. 

*Credit dependent on package selected. Setup fee and minimum contract term may apply. Visit for full promotional offer details. 
Credit cannot be redeemed for cash. Offer ends December 31, 2008. Product and program specifications, availability and prices subject to change without notice. 
1&1 and the 1&1 logo are trademarks of 1&1 Internet AG, all other trademarks are the property of their respective owners. 
© 2008 1&1 Internet, Inc. All rights reserved 





m^op caii1.877.go1and1 

Bb^bU visit us now id ncii .com 



Table Of Contents Volume 7 • Issue 1 January 2009 


AL^ g^ Mobile • t 

V> Security 

To what extent do you truly put your data at risk 
when you connect to a Wi-Fi hotspot or download 
message attachments on a mobile phone? This 
month, we separate the hype from the reality and 
explain how you can keep your information safe 
when traveling with mobile devices. 


Stay Secure At Wi-Fi Hotspots 

The Power Is Yours 


Keep Your Data On Lockdown 

Portable Options For 
Storing Your Information 


Thwart Internet & Cellular Threats 

Prevention & Caution Are Key 

Copyright 2009 by Sandhills Publishing Company. PC Today is a registered trademark of Sandhills Publishing Company. All rights 
reserved. Reproduction of material appearing in PC Today is strictly prohibited without written permission. Printed in the U.S.A. 
GST # 123482788RT0001 (ISSN 1040-6484). PC Today is published monthly for $29 per year by Sandhills Publishing Company, 131 
West Grand Drive, P.O. Box 85380, Lincoln, NE 68501-5380. Subscriber Services: (800) 733-3809. 


Product Coverage Inquiries 

(800) 247-4880 

131 West Grand Drive 

Lincoln, NE 68521 


(To adjust your bulk order or to request racks.) 

(800) 334-7458 

Customer Service 

(For questions about your subscription 

or to place an order or change an address.) 

(800) 733-3809 

FAX: (402) 479-2193 

PC Today 

P.O. Box 85380 
Lincoln, NE 68501-5380 


Mon. - Fri.: 7 a.m. to 8 p.m. (CST) 

Sat.: 8 a.m. to 4 p.m. (CST) 

Online Customer Service 

& Subscription Center 

Authorization For Reprints 

(800) 247-4880 

Tech To Go 

14 Quick Guide To Smartphones 

15 Verizon Wireless Blackberry Storm 

16 T-MobileG1 

17 Palm Treo Pro 

18 Sony Ericsson Xperia X1 

19 AT&T HTC Fuze 

20 Quick Guide To Notebooks & Portables 

21 Lenovo ThinkPad X200 Tablet 

22 Apple MacBook Air 

23 Asus M50Vm-A1WM 

24 Quick Guide To Mobile Gear 

25 Magellan Maestro 4370 

26 Denon AHNC732 Noise Canceling Headphones 

27 Fujitsu ScanSnap S300 

28 Ten One Design Pogo iPhone Stylus 

29 Matias Folding Keyboard 

30 Boingo Wireless 

31 Eye-Fi Share Card 

32 DmailerSync 

33 Barracuda Networks Barracuda Backup Service 

■ Logbook 

6 We've Got Your Numbers 

7 Noteworthy 

9 Tech To Watch 

Robust Surface Navigation 

10 Mobilization Through Technology 

How Obama Used The Web 
To Win 

12 Wireless Today 

What's Here & What's Right 
Around The Corner 

■ Unwired 

46 New For Your Mobile Phone 

The Latest Updates & Services 

48 BlackBerry Tips 

Maximize Memory & Find Answers 

50 Windows Mobile Tips 

Sync Your Life 

52 Will Android Push IT'S Buttons? 

A Closer Look At This New OS 

54 Digital Finance 

How Mobile Payments Work 

56 All About Power 

The Strange & Possible Future 

58 New & Updated Mobile Software 

Get More Done With 
Your Mobile Device 

60 Digital Downtime 

Notes On The Latest 
In Digital Music & Video 


62 Construction Zone 

The Latest Hotel & Airport News 

64 Know Before You Go 

Travel Web Sites & Business Travel 

66 Washington Dulles 
International Airport 

Instant Guide To IAD 

■ Business Travel 911 

68 Business Travel Emergency? 

70 Excel In A Crunch 

72 Solve Notebook-Projector 
Setup Problems 

74 The Traveler's 911 Directory 


76 The Business End 

HP On Mobility 

78 The Delayed Traveler 

Admit It, This Is The First Page 
You Turned To 


Compiled by Linne Ourada 

WeVe Got Your 

-^ -w- We ve Got Your -J 


The results of the 21st Annual Readers' Choice Awards are in. Awards are based on reader polls 
that rate travel-related categories, such as destination, mode of transportation, and lodging. In the 
airline awards, Virgin America, which launched just last year and serves only seven cities in the 
U.S., claimed the No. 1 spot in the Domestic Routes category. The win was likely due in part to 
the airline's entertainment options, featuring a food ordering system, 30 films, MP3s, video 
games, live television, and more. 

Source: Conde Nasi Traveler & Virgin America 

The Amtrak train system posted 
another ridership record for the 
latest fiscal year ending in Sep- 
tember 2008. Amtrak carried a 
total of 28.7 million passengers 
for an 11.1% increase over the 
previous 12-month period. 

Source: Amtrak 

jm ^^ It's not your traditional love note, but text messaging plays 
^P L I I an important role in relationships. An AT&T survey reveals 
^^ that 40% of text-messaging adults (ages 18 to 55) think that 
sending text messages plays a "significant or very significant role" in their ro- 
mantic lives. Additional stats reveal that 68% of respondents have sent a love 
note via text message, and 28% say they text at least three times a day with a 
spouse or significant other. 

Source: AT&T 

Courtesy of Apple 

The strongest growth of iPhone sales last 
summer came from users earning less than 
the median household income. This suggests 
that lower-income households may be 
turning to iPhones to save on the cost of 
having multiple electronics devices. In 2008, 
iPhone ownership increased 48% from June 
to August among households earning be- 
tween $25,000 and $50,000 per year. 

Source: comScore 

Telecommuting appears to be a win-win situation — for 
employers and their employees. Companies that offer 
their employees the option of telecommuting are reaping 
benefits in terms of productivity and cost savings, among 
other advantages. According to a Web-based survey, 
67% of respondents say their companies have seen a 
boost in productivity. In addition, 39% say their organi- 
zations have access to better-qualified staff, and 37% say 
telecommuting helps improve employee retention. 

Source: CompTIA 

^^^^m ^m^ In a recent poll, nine 
y m J out of 10 U.S. students 
M ^^k agree that Wi-Fi is an 

m ^L M essential part of col- 

M ^8^^ lege, both academically 

and socially. Of those surveyed, 73% say Wi- 
Fi helps them to get better grades, and 79% 
admit college would be a lot harder without it. 
Furthermore, three in five students say they 
wouldn't go to a college that doesn't offer free 
Wi-Fi. In fact, 48% of the students claim they 
would be willing to give up beer before they 
would give up Wi-Fi. 

Source: Wi-Fi Alliance 

The FBI's cyber division has reportedly seen a rise in computer crime over the past year, with 
more reports of computer spying and ID theft. The Internet Crime Complaint Center, which the 
FBI oversees, has received more than 
1 million complaints since its incep- 
tion in 2000, logging 18,000 to 20,000 
complaints per month. 

Source: Reuters 

1 million 

According to an AP analysis, the current air traffic routes and radar system are costing U.S. air- 
lines billions of dollars in wasted fuel. However, if a satellite-based network was enforced, GPS- 
enabled planes could take the shortest routes, and airlines could save up to 3.3 billion gallons of 
fuel — or more than $10 billion in fuel costs — per year by 2025. 

Source: USA Today 

6 January 2009 / 


Compiled by Blaine Flamig 



Will Business Traveler 
Volumes Drop? 

Considering the current economy, 
recent Travel Industry Association 
forecasts of a decline in business 
travel volume for 2008/2009 aren't 
surprising. Though leisure-travel 
volume will modestly decline in 2009 
(-1.3%), the TIA predicts business- 
travel volume to drop 3.7% for 2008 
and 2.7% for 2009. A recent New York 
Times article, meanwhile, attributes 
an unnamed luxury hotel chain exec- 
utive as saying the dominoes are 
falling among full-service hotels that 
business travelers frequent in major 
cities worldwide. Positively, the cur- 
rent economy is providing corporate 
travel managers more negotiating 
power with hotels concerning con- 
tracts, the article suggests. 


Headed To NYC 

A mid-November, $7.5-million deal to buy 14 landing slots at LaGuardia Airport from 
ATA Airlines, which filed for bankruptcy in April 2008, will give Southwest Airlines its 
first presence in New York City starting in early 2009. A U.S. Bankruptcy Court must first 
approve the move. "It is a huge step," stated Bob Montgomery, Southwest vice president 
of properties. "It's going into an area we, frankly, didn't think we'd ever be in." 

Checkered Flag Again 

For the fifth straight year, En- 
terprise-Rent-A-Car ranked top 
among airport rental car compa- 
nies in J.D. Power and Associates' 
recent annual Rental Car Satis- 
faction Study. (Hertz and Alamo 
finished second and third, respec- 
tively.) Based on 13,400-plus eval- 
uations from leisure and business 

travelers, the study indicates customer satisfaction with rental 
companies was down for 2008, though only one in 10 participants 
reported a significant negative rental-car experience. 




Offers Frequent-Flier Alert Service now has a 
service that alerts trav- 
elers to when they can 
use their frequent-flier 
miles to book an award 
seat on a specific flight. 
The function is part of 
an existing service that 
tracks and alerts users of price drops for any designated flight. If 
you already bought tickets, will also monitor the price 
you paid in case the airline later drops its price and then help you 
get a refund. 

PC Today /January 2009 7 


TSA UNVEILS Millimeter Wave Technology 

New Transportation Security Administration security tools un- 
veiled at the November opening of the $1.1 billion Col. H. Weir 
Cook Terminal Building at Indianapolis International Airport in- 
cluded electromagnetic-based millimeter wave technology, 
which lets agents check passengers in seconds, without contact, 
for weapons, explosives, and metallic and nonmetallic objects. 
Also unveiled was upgradeable, multiview X-ray technology for 
checking carry-on bags, which provides a " significant increase in 
details and sophistication from current, single-view X-ray/' 

GERMANY TO PASS On Full-Body Scanners 

Even if the European Union authorizes the use of full-body secu- 
rity scanners in airports, Germany won't use them. "I can tell you 
in all clarity that we will not take part in this nonsense," Interior 
Ministry spokesperson Gabriele Hermani recently stated. In late 
October, the EU called for more studies into the scanners, which 
display an X-ray-like outline of a traveler's body. Although sev- 
eral countries have tested the scanners, some EU lawmakers have 
equated them to a "virtual strip search" that could have a "se- 
rious impact on the fundamental rights of citizens." 

Willi' /"Uiv\C 



FORBES RANKS The World's Top 400 Luxury Hotels 

Like lists? Then check out Forbes Traveler 400 (www.forbes, a compilation of 2008/2009's top 400 
global luxury hotels. Celebrity chef Todd English, Lonely Planet 
publisher Tony Wheeler, former Expedia CEO Erik Blachford, and 
other experts initially selected 800 hotels. Forbes then commis- 
sioned professional travel writers for reviews (no complimentary 
stays, thank you) to select the top 400. Sublists include The 
World's Top Hotel Countries /Cities, World's 50 Best New Hotels, 
and America's 50 Best Hotels. 

ZAGAT'S 2009 SURVEYS Detail U.S. Hotels & Restaurants 

Restaurant and hotel reviewer Zagat cites Las Vegas as the most 
expensive city for dining (a "whopping $44.44" per meal) in its re- 
cent 2009 survey of top American restaurants (145,000 surveyors 
ate 25 million meals in 45 markets at 1,500-plus establishments). 
New York City ($40.78), Miami ($38.86), and San Francisco 
($38.70) follow. Zagat's survey of U.S. Hotels, Resorts & Spas, cov- 
ering 1,001 properties with input from 14,000-plus participants, 
meanwhile, concludes that Expedia and Trip Advisor are the best 
travel Web sites, and Homewood Suites, Embassy Suites, and 
Doubletree are the best value chains. 







Extract May Relieve 
Jet Lag Symptoms 

A recent study from an 
Italian university suggests 
the pine bark extract Pyc- 
nogenol may reduce the 
length and severity of jet 
lag symptoms. Patients who 
took 50mg of Pycnogenol 
three times a day for a week 
starting two days before a 
seven- to nine-hour flight 
scored 56% lower in tests 
measuring jet lag symp- 
toms vs. 30 control patients. 
Further, Pycnogenol pa- 
tients' symptoms averaged 
18.2 hours vs. 39.3 hours. 
Additionally, brain scans 
done within 28 hours 
after flights indicated 
Pycnogenol patients had 
less brain swelling and 
short-term memory impair- 
ment related to jet lag. 


To Require More 



The TSA will take over the 
prescreening duties of do- 
mestic passengers from air- 
lines in early 2009 following 
formal approval of a pro- 
gram that several groups 
have criticized for privacy 
rights concerns. The Depart- 
ment of Homeland Secu- 
rity's Secure Flight program 
will also require U.S. do- 
mestic passengers to now 
provide a full name, birth 
date, and gender during 
reservations. The TSA will 
take over international pas- 
senger prescreening chores 
later in 2009. 

8 January 2009 / 



Robust Surface 

For the GPS-aware among us, few 
will argue that the satellite-based 
navigation system is a godsend to 
frequent travelers and the directionally 
impaired. But GPS wasn't designed with 
the perpetually lost in mind; it was initial- 
ly a military navigation system called 
NAVSTAR, developed in the 1970s. Cur- 
rent GPS receivers can zero in on a GPS- 
enabled device to within 3 meters, but 
the Achilles' heel for military appli- 
cations is the fact that GPS is dependent 
on a network of 24 satellites traveling at 
about 7,000 mph, roughly 12,000 miles 
above the Earth. As a result, GPS sometimes 
fails to produce accurate results under 
dense foliage, inside structures, or near 
man-made or natural obstructions. Further- 
more, hostile forces can jam GPS devices, 
rendering them useless in a given area. But 
another geolocation technology is currently 
in the works that will perform like GPS, but 
without any of the drawbacks. 

DARPA (Defense Advanced Research 
Projects Agency) is currently working on 
an alternative to GPS called RSN (Robust 
Surface Navigation). RSN relies on "signals 
of opportunity," or a hodgepodge of exist- 
ing and widely available electromagnetic 
waves emanating from satellites and TV, 
radio, and cellular towers to deliver the 
same or better geolocation features of GPS, 
without requiring expensive hardware or 

proprietary transmitters. And because the 
airwaves upon which RSN depends are 
vital to the existing communications and 
broadcasting infrastructure, they are likely 
to be very reliable. 

The location-finding capabilities of RSN 
are similar to those of GPS, in which a re- 
ceiver determines the user's position by 
comparing the amount of time it takes for 

Five Reasons To Watch RSN 

• Relies on existing TV, radio, cellular, 
and satellite broadcasting equipment 

• Available even when GPS is blocked or 

• Uses beacons in the absence of existing 
electromagnetic signals 

• Provides precise locations even in GPS 
blind spots 

• Becomes more accurate with more elec- 
tromagnetic waves 

satellite signals to reach the user. RSN adds 
fixed TV, cellular, and radio waves to the 
mix of transmitters. RSN can very precise- 
ly pinpoint a target by combining and com- 
paring these multiple signals. But what 
about more desolate areas where few, if any, 
available electromagnetic waves propagate? 
With that in mind, DARPA is developing 

the technology to use strategically deployed 
electromagnetic wave-emitting beacons, 
which can augment RSN's performance. 

A company called Rosom has already 
developed geolocation technology based on 
TV broadcasts. Rosom's system detects 
image-synchronization data within TV 
broadcasts and uses that data to determine 
the distance between the tower and a spe- 
cialized receiver. 

In early 2007, DARPA solicited the aero- 
space giant Boeing and Argon ST, a C5ISR 
(Command, Control, Communications, Com- 
puters, Combat systems, Intelligence, Sur- 
veillance, and Reconnaissance) systems and 
services provider, to develop an architecture 
and algorithms that would enable a receiver 
to take advantage of various electromagnetic 
waves for RSN. In May 2008, following suc- 
cessful Phase 1A performance, DARPA 
awarded Argon ST the Phase IB contract to 
analyze potential RSN navigation perfor- 
mance and develop a demonstration con- 
cept. Argon ST called upon Honeywell 
Laboratories and Ticom Geomatics to pro- 
vide software and engineering support for 
the project. 

Phase 2 of the RSN project involves build- 
ing a working prototype, which isn't likely to 
see the light of day for some time. So look for- 
ward to RSN, but don't toss your GPS out the 
window just yet. by Andrew Leibman 

PC Today / January 2009 9 


How Obama Used 
The Web To Win 


Politicians typically have a lot to say 
about accountability and responsi- 
bility, but few have been able to in- 
still those principles into a campaign the way 
President-elect Barack Obama did through- 
out his successful bid for the presidency. By 
reaching out to supporters through new tech- 
nology mediums, he made himself more 
transparent to voters than candidates have in 

the past, and he found new ways to rally sup- 
porters to help him win the election. 

Obama tapped into all types of new and 
emerging technologies, including SMS text 
messaging, Internet videos, iPhone applica- 
tions, and other Web tools, to rally his foun- 
dation of grassroots supporters who helped 
propel him into the White House. The un- 
precedented use of these technologies also 

helped the campaign shatter fundraising 
records and has changed the way politicians 
interact with voters. 

Find Out Who Your Friends Are 

At, Obama's official 
campaign site, supporters weren't just able to 
obtain information about issues and policies. 
They could interact with the campaign itself 



Wireless Today 

What's Here & What's Right Around The Corner 

3G wireless networks are now offered 
by all four of the major U.S. wireless 
providers: AT&T, Sprint, T-Mobile, 
and Verizon Wireless. You'll find 3G mostly in 
urban or metropolitan areas, and you need a 
3G-capable phone or notebook PC to access it. 
(Some notebooks now have built-in access; oth- 
erwise, you need an aircard or tethered phone.) 
All of the mobile providers expanded their 3G 
networks during 2008. As the market expands 
and access speeds become faster, more data 
subscribers are coming on board — especially 
with the introduction of the Apple iPhone 3G 
and other well-appointed 3G handsets. Here's a 
closer look at current and future offerings. 

Today's 3G Networks & 

AT&T and T-Mobile use the HSPA (High- 
Speed Packet Access) standard based on GSM 

(Global System for Mobile Communication) 
networks. Verizon Wireless and Sprint use the 
CDMA (Code Division Multiple Access)-based 
EVDO (Evolution Data Optimized) Rev. A. 

AT&T. In 2008, AT&T aggressively ex- 
panded its network in preparation for the 
iPhone 3G release in July 2008. The company 
forecast 3G availability of its Broadband- 
Connect service in 350 major markets by the 
end of 2008. AT&T also upgraded its 3G net- 
work to deploy its HSPA technology fully in 
both uplinks (HSUPA) and downlinks 
(HSDPA), bringing typical download speeds of 
700Kbps to 1.7Mbps and upload speeds of 
500Kbps to 1.2Mbps to its network. AT&T's 
signature 3G phones include the Apple iPhone 
3G and the BlackBerry Bold. 

Sprint. As of November 2008, Sprint's 
Mobile Broadband Network coverage area 
included 218 major markets and 1,002 airports. 

Sprint began upgrading its EVDO network to 
the faster Rev. A in 2006, and most of the com- 
pany's mobile broadband network now uses 
this technology. 

Sprint Mobile Broadband devices that are 
EVDO Rev. A-capable operate at average 
download speed ranges of 450 to 800Kbps 
with peak rates up to 3.1Mbps and at average 
upload speeds of 300 to 400Kbps with peak 
rates up to 1.8Mbps. Sprint's first EVDO Rev. 
A consumer handset was the Samsung 
Instinct, a touchscreen phone introduced in 
June 2008. 

T-Mobile. Due to network capacity issues, 
T-Mobile got a late start with 3G compared to 
other carriers. The company's first 3G net- 
work debuted in New York City in May 2008. 
T-Mobile is rapidly expanding 3G avail- 
ability; it ramped up to bring coverage to 120 
major cities as of November 2008. 

12 January 2009 / 


As with A&T, T-Mobile's 3G network uses 
UMTS (Universal Mobile Telecommunications 
System)/HSPDA (High-Speed Downlink 
Packet Access) technology, delivering down- 
load speeds of up to 1Mbps. The current fa- 
vorite T-Mobile 3G handset is the Gl (with the 
Google-backed Android mobile operating 
system), introduced in October 2008. 

Verizon Wireless. Verizon Wireless began 
offering 3G broadband in 2003. It has con- 
tinued to build out and enhance its network, 
and as of June 2007, EVDO Rev. A technology 
was available throughout. In November 2008, 
the provider's BroadbandAccess service was 
available in 258 major metro areas and 244 pri- 
mary airports. 

Verizon Wireless BroadbandAccess cus- 
tomers with Rev. A-compatible devices can 
expect average download speeds of 600Kbps 
to 1.4Mbps and average upload speeds of 500 
to 800Kbps. The leading 3G-capable smart- 
phones from Verizon Wireless include the LG 
Dare and the BlackBerry Storm. 

What's Coming: 4G 

All four wireless providers intend to ex- 
pand and enhance their 3G networks in the 
coming months. Some of the enhancements 
will include movement toward the next-gener- 
ation network technologies: LTE (Long Term 
Evolution) and WiMAX (Worldwide Interop- 
erability for Microwave Access). These 4G net- 

works could provide dramatic improvements, 
with eventual download speeds of up to 

AT&T plans to move to HSPA+ (Evolved 
HSPA) and then LTE, with the hope of 
launching LTE in 2010. T-Mobile has also an- 
nounced its intention to move to LTE for its 4G 
technology. And like AT&T, Verizon Wireless 
plans to launch an LTE network in 2010. 

Choosing to deploy WiMAX instead, Sprint 
is in the process of combining its Xohm 
WiMAX business assets with partners such as 
Google and Intel to form a new joint venture 
called Clearwire. In the mean time, Baltimore 
experienced the first Xohm deployment in 
October 2008. 

Network Types & Terms 

Mobile broadband networks include an alphabet-soup 
of acronyms and terms. 2G, 3G, and 4G, for example, 
refer to the second, third, and fourth-generation of cellular 
technology. As technology has improved, data speed trans- 
missions have increased dramatically. The first digital (2G) 

networks downloaded data at a mere 20Kbps. Today's 3.5G 
networks can download data at speeds as fast as 14.4Mbps. 
The next generation of 4G networks is expected to offer max- 
imum download speeds of 100Mbps — similar to wired broad- 
band speeds. 


Max Download Speed 

Sprint, Verizon Wireless 
Network Technologies 

AT&T, T-Mobile 
Network Technologies 


Up to 20Kbps 


(Code Division Multiple Access) 


(Global System for Mobile Communication) 


Up to 380Kbps 


(1 times Radio Transmission Technology) 


(Enhanced Data rates for GSM Evolution) 

3G to 3.5G 

3G: Up to 2.4Mbps 
3.5G: Up to 14.4Mbps 

EVDO (Evolution Data Optimized) 

. Rev.O 
. Rev. A 


(Universal Mobile Telecommunications System) 

HSPA (High-Speed Packet Access) 

. HSUPA (upload) 
. HSDPA (download) 
. HSPA+ (Evolved HSPA) 


Up to 100Mbps 


(Long Term Evolution; AT&T, T-Mobile, Verizon Wireless) 


(Worldwide Interoperability for Microwave Access; Sprint) 


(Ultra Mobile Broadband no longer in development) 

PC Today / January 2009 13 

Tech To Go 

Quick Guide To 


HI by Jennifer Johnson 

Time is precious. We are always looking to maximize every minute. 

Given the many ways a smartphone can help you make the most of the time you have, it's no wonder this device 
has become a staple for many business professionals. Even so, shopping for a smartphone can be confusing. 
We're here to help with some things to keep in mind if you're looking to purchase a smartphone. 

• • • 

LIKE regular cell phones, smartphones come in many shapes and sizes. There are candy 
bar-style smartphones, sliders, and clamshells. No single form factor is right for everyone. 
Some smartphones have a hardware keyboard while others use an on-screen keyboard. 
Touchscreens are another optional feature. Consider the size of the smartphone along with its 
design. You'll want a smartphone that fits comfortably in your hand and is easy to use. For some people, 
this may be a sliding smartphone with a full QWERTY keyboard and touchscreen. Other users may 
prefer something a bit smaller, such as a thin candy bar-style phone with very few hardware buttons. 

• • • • 

SMARTPHONES keep us connected while we're away from the office. Smartphones 
with integrated Wi-Fi provide an additional means of connectivity beyond traditional 
cellular airwaves. With Wi-Fi, you can connect to the Internet at high speeds when a 
hotspot is available. 

Another option for connectivity is Bluetooth, a standard for short-range wireless communications. 
Bluetooth technology is often used to connect two devices, such as a smartphone and a wireless 
headset. You can also use Bluetooth to connect your smartphone to your laptop, thereby allowing the 
phone to serve as a high-speed modem for the notebook using dial-up networking. 

If your smartphone has built-in GPS and navigational software, your phone can serve double-duty as 
your personal copilot, ensuring you take an efficient route to your destination. 

• • • • 

WHEN shopping for a smartphone, you'll come across a variety of acronyms that de- 
scribe the types of networks on which a phone operates. CDMA (Code-Division Multiple 
Access) and GSM (Global System for Mobile Communications) are the most common cellular 
standards. AT&T and T-Mobile operate on GSM, while Verizon Wireless and Sprint use CDMA. 

GSM is most common worldwide, though CDMA providers in the U.S. do sell phones that work over- 
seas. If you're planning to travel overseas and want to use your smartphone during your travels, be sure 
to buy a phone that supports the frequency bands used overseas. You'll also need an appropriate calling 
plan from your carrier. 

IN THE U.S., we buy phones at a discounted price because the cellular provider 
(AT&T, Sprint, T-Mobile, Verizon Wireless, and so on) subsidizes the price of the 
phone. In return for the discount, carriers require you to sign a contract agreeing to have 
service with the carrier for a specified length of time (typically one or two years). To protect 
their own interests, many carriers lock the phones so customers can only use the phone on that carri- 
er's network. Should you prefer not to sign a contract and wish to pay full retail price for the phone, 
you can get an unlocked model to use with any compatible carrier. 


In addition to the phys- 
ical form factor, consider 
the OS on which the 
phone runs. 

Windows Mobile. For 

users who are accus- 

Windows Mobile OS is 
familiar and easy to learn. 

want an interface that is 
relatively simple to navi- 
gate, the Palm OS is 
worth considering. 

BlackBerry. BlackBerry 
handhelds are known 
for their solid email ca- 
pabilities, and newer 
models offer additional 
features comparable 
to those found on 

OS X iPhone. Apple de- 
veloped its own OS for 
use on the iPhone, com- 
plete with a full Safari 
Web browser. 

14 January 2009 / 

Tech To Go 


This is what you've been 
waiting for: the first touch- 
screen BlackBerry. 

BlackBerry Storm 

Go ahead, touch it. Now imagine that its large, bright touchscreen clicks in response to every finger tap, pro- 
viding sensory feedback that helps you use the smartphone more effectively. Research In Motion went all 
out with its first touchscreen BlackBerry®, endowing it with the SurePress™ touchscreen, global phone and 
global email services, and a full HTML browser that won't diminish your Web experience. 

With cutting-edge multimedia capabilities and a sleek design, the BlackBerry Storm makes a great impres- 
sion no matter where you're headed. And, with built-in GPS, the Storm will even help you get where you're 
headed. In addition to the BlackBerry Internet service and support for cellular networks used around the 
globe, the Storm includes productivity apps that let you work on Microsoft Office® applications on-the-go. 
And, during your downtime, you can enjoy a multimedia player and 1GB of embedded storage that accom- 
modates up to 250 tunes. 

Key Facts 

• In addition to support for 
multiple cellular networks 
worldwide, the Storm's 
Global Literature Kit lets 
the smartphone switch 
between CDMA and GSM 

• The Storm combines the 
speed of 3G and a full 
HTML browser to bring 
you a rich Web experience 

• The Storm includes fea- 
tures that provide access 
to company email and so- 
cial networking alike 

Tech Specs 

. Quad-band GSM/GPRS 
(850/900/1 800/1 900MHz), 
UMTS/HSPA (2100MHz), 
and dual-band 
(800/1 900MHz) 

• Up to 5.5 hours talk time 
(GSM), 6 hours talk time 
(CDMA), and 15 days 
standby time 

• 1GB memory, 128MB flash 
memory; expandable with 
microSD™ card 

• 3.25-inch display with 480 
x 360 resolution 

• 5.5 ounces 

• 4.43 x 2.45 x 0.55 inches 

*& BlackBerry Storm 

$199.99 after discounts with two-year contract | Verizon Wireless | 

PC Today / January 2009 15 

Tech To Go 


Google, HTC, and T-Mobile 
are the dream team be- 
hind the G 7 smartphone. 

■F ■ -Mobile - 

^ H ^ 

Alarm Clock Amazon MP3 Browser Calculator 

3 * • 

Calendar Camera Contacts Dialer 

Email Gmail IM Maps 

H # fe «* 

Market Messaging Music myFaves 

> rtfi 

T-Mobile G1 

Dreaming of a device that offers the power of touch and all the smart features you need for business and 
entertainment? Wake up to the G1, built by HTC (and aptly code-named the Dream) to run Google's® An- 
droid™ mobile platform on T-Mobile's high-speed 3G network. Use the G1's touchscreen interface or slide- 
out QWERTY keyboard to bring up any Web site (even if a streaming YouTube video is what you're after); 
use a Google application (including Google Maps™ for navigating and checking out satellite, traffic, and 
street views); play music or a video; or simply communicate via voice, email, or text message. 

The G1 uses the powerful Qualcomm® MSM7201 A processor and offers 256MB device memory and 192MB 
available user memory, storage expansion with a microSD™ card, Bluetooth® 2.0+EDR, a 3.2MP camera, and 
Wi-Fi. In fact, the G1 switches automatically between 802.11 b/g Wi-Fi networks and T-Mobile's 3G net- 
work, based on availability, to give you the best speed at all times. 

Key Facts 

• Intuitive user interface and 
hinged touchscreen that 
slides open to reveal a full 
QWERTY keyboard 

• Google Maps provides 
map information, satellite 
imagery, local business 
info, and driving direc- 
tions, as well as MyLoca- 
tion to let users know 
where they are 

• Google Maps Street View 
syncs with the built-in 
compass on the phone— 
an industry first— to let 
users view locations and 
navigate 360 degrees by 
simply moving the phone 
with their hand 

• Con ven ien t trackbal I for 
one-handed navigation 

Tech Specs 

• Quad-band GSM 
1900MHz), WCDMA 
(1 700/21 00MHz) 
Up to five hours talk time 
Up to 130 hours standby 
1GB microSD™ memory 
card (upgradable to 16GB) 
3.2MP camera with photo- 
sharing capabilities 
Built-in GPS 

Voice recognition, voice 
dialing, and speakerphone 
5.6 ounces 

4.6x2.16x0.62 inches 

T ■ -Mobile ■■ 

$179 with two-year contract | T-Mobile | 

16 January 2009 / 

Tech To Go 


Define your workday with 
a 3G smartphone that has 
no strings attached. 

Treo Pro 

Tired of the strings associated with buying smartphones from wireless carriers? With the unlocked Treo Pro, 
you can go directly to the source for your next professional smartphone: Palm. Designed with individual 
mobile professionals and mobile workforces in mind, you can buy one or buy in volume. The Treo Pro uses 
3G networks, Windows Mobile® 6.1, Microsoft Outlook®, and Microsoft Exchange Server support to keep 
you in communication with your colleagues and the world. 

With Wi-Fi (802.1 1 b/g) and GPS built in, the Treo Pro will keep you connected to all the hotspots and navi- 
gation services you need around the office and during your travels. And the smartphone's touchscreen 
makes navigating easy. And speaking of travel, the Treo Pro is a GSM world phone that works on networks 
in 220 countries. Additional features include Bluetooth® 2.0+EDR, a microSDHC® card slot (32GB maxi- 
mum), a 2MP digital camera, and a standard 3.5mm stereo headphone jack. 

Key Facts 

• Palm shortcuts for the 
things you do most 

• Large color touchscreen 
and full keyboard 

• GPS for navigation, turn- 
by-turn directions, and 
local search 

• Functionality to perform 
as a high-speed modem 
for your laptop 

Tech Specs 

GPRS/GSM (850/900/ 

• Up to five hours talk time 

• Up to 250 hours standby 

. 256MB storage (100MB 
user available), 128MB 

• Built-in GPS 

. Wi-Fi 802.11 b/g with 

• Bluetooth® 2.0+EDR 

• 2MP camera with 8X 
digital zoom and video 

• Microsoft® Windows 
Mobile® 6.1 Professional 

• MicroUSB 2.0 for synchro- 
nization and charging 

• 3.5mm stereo headset jack 

• 4.69 ounces 

• 4.49 x 2.36 x 0.53 inches 


$549 | Palm | 

PC Today / January 2009 17 

Tech To Go 


This smartphone does 
things your way and 
works all over the world. 

Xperia X1 

Pick a few features you love about your notebook— full Web access, fast connection speed, RSS news feeds, video 
chat, keyboard, bright screen at a tilt— and imagine them in a smartphone. Those are among the features you'll find 
in Sony Ericsson's new Xperia™ X1. And the Xperia™ XT s intuitive interface works in whatever mode you're most 
comfortable with: via a full QWERTY keyboard (which slides out in an arc design), by touch, using a 4-way key (simi- 
lar to many mobile phones), or using an optical joystick. 

With support for multiple wireless modes, the Xperia™ X1 is also flexible when it comes to keeping you connected 
at all times. In addition to Wi-Fi and Bluetooth® stereo (A2DP), the quad-band GSM/GPRS/EDGE smartphone also 
supports UMTS/HSPA/HSUPA networks and has built-in A-GPS. With Windows Mobile® and mobile versions of 
Office applications, the Xperia™ X1 has the productivity angles covered. The smartphone also includes 400MB inter- 
nal storage and a microSD™ memory card slot for more. 

Key Facts 

• Enter the world of 3G 
smartphones and discover 
video calling, streaming 
video, and a fast Web ex- 
perience with multiple 
connectivity options 

• Handwriting recognition 
lets you jot down notes, 
further expanding the 
input options that include 
a QWERTY keyboard and a 
touchscreen interface 

• Windows Mobile® and 
portable versions of 
Microsoft Office® applica- 
tions help you stay produc- 
tive wherever you are 

Tech Specs 

(850/900/1 800/21 00MHz), 

• Up to 10 hours of talk time 

• Up to 500 hours of 
standby time 

• Up to 400MB phone 

• Wi-Fi (802.1 1b/g) 

. Bluetooth® 2.0 +EDR 

• 5.6 ounces 

• 4.4x2.1 x 0.7 inches 

$799.99 | Sony Ericsson | (877) 865-7669 | 

18 January 2009 / 

Tech To Go 


An easy 3D interface sets 
this Windows Mobile® 
smartphone apart 

HTC Fuze 

If you're looking for a smartphone that's both stylish and easy to use, the HTGmade Fuze from AT&T has it 
covered. The Fuze doesn't stop at the surface, though; look further and you'll find that the Fuze is a fully 
capable Windows Mobile® 6.1 Professional smartphone. A GSM/GPRS/EDGE world phone with UMTS/ 
HSDPA 3G capabilities, the Fuze includes Microsoft® Office Mobile (with mobile versions of Excel®, One- 
Note®, PowerPoint®, and Word®), Opera (for full HTML Web browsing), Bluetooth® 2.0 +EDR, and XM Satel- 
lite Radio. In short, the Fuze is ready for both productivity and play— exactly what you need for travel. 

As for ease of use, the Fuze includes the Touch FLO™ 3D interface, which features a Home screen and imme- 
diate finger-touch access to email, contacts, calendar, phone, Internet, and more. Tap the icon you want 
and just follow along to accomplish any smartphone task. A slide-out keyboard lets you type when neces- 
sary. The Fuze also features Wi-Fi (802.1 1 b/g), GPS support, a 3.2MP camera with video, and much more. 

Key Facts 

• Built-in GPS works with 
location-based applica- 
tions, including AT&T 
Navigator powered by 
TeleNav, TeleNav Track™, 
and Xora GPS TimeTrack™ 

. Wi-Fi (802.11 b/g) lets you 
connect with home or 
workplace networks, or 
access the Internet via any 
of more than 17,000 
AT&T Wi-Fi Hot Spots (in- 
cluding thousands of par- 
ticipating Starbucks 
locations) nationwide 

• AT&T Video Share SM is the 
first service in the U.S. that 
allows users to share live 
video over wireless devices 
while participating in a 
voice call 

Tech Specs 

. Quad-band GSM/GPRS/ 
EDGE (850/900/1800/ 

• Up to 7.4 hours talk time 

• Up to 1 9.3 days standby 

. 512MB internal ROM; 
288MB RAM; expandable 
to 32GB with microSD™ 
memory card 

• Bluetooth® 2.0 +EDR; Wi-Fi 
(802.11 b/g) 

• 5.82 ounces with battery 

• 4.02x2.01 x0.71 inches 


$299.99 after discounts with two-year contract | AT&T | (888)333-6651 | 

PC Today/ January 2009 19 

Tech To Go 

Quick Guide To 

Notebooks & Portables 

by Tessa Breneman 

WHEN purchasing a notebook or portable device, there are 
many features and components to consider, and you'll likely en- 
counter a few unfamiliar terms during your search for just the 
right device, as well. The key to making a good purchase is to understand 
your basic options. 

First, you should decide whether you need a single-core or dual-core 
processor. (A dual-core processor will be more efficient and lets you per- 
form twice the work in the same amount of time.) You also need to con- 
sider system memory and whether 1GB will be adequate, or if you should 
purchase 2GB or more and extend the lifetime of your machine. Built-in 
Ethernet is becoming standard on many portable devices, but be sure yours 
supports the latest wireless technology standard, 802.1 In. When shopping 
for any device, weight and design are very important considerations: You 
probably don't want to lug a heavy desktop replacement notebook through 
airport security. 

PORTABLE devices have evolved to offer some very useful 
added features, such as built-in wireless technology, Bluetooth 
capabilities, and support for Blu-ray Discs. Some notebooks also 
offer as many as six USB ports and advanced color technology for your 
display. Fingerprint readers provide extra security for data, and a freefall 
sensor adds physical protection to your hardware. 

When looking at extra features, consider how you'll use your device. 
For example, an integrated Web cam microphone could be useful for 
remote meetings. Several UMPCs (Ultra-Mobile PCs) have touchscreens 
that recognize handwriting and include GPS navigational software. Also, 
some MIDs (mobile Internet devices) offer high-definition video and 
audio compatibility. 

HOW do you know if you're getting the most from Vista? 
The minimum requirements for running Vista are 512MB of 
RAM and an 800MHz processor. Some laptop manufacturers, 
such as Dell and IBM, say you're better having at least 2GB of RAM. 
You'll need at least 1GB of RAM, a 128MB graphics card, and a 1GHz 
processor to experience the Aero user interface on Vista. 

Vista has features, such as SuperFetch, that require more gigabytes 
of memory than Windows XP apps. SuperFetch takes data from the 
hard drive and stores it on available RAM so it's accessible from the 
processor, which would ultimately require more than the suggested 
amount of RAM. If you're purchasing a computer rather than merely 
upgrading your OS, be sure you get your money's worth by purchaser 
a notebook with at least 2GB of RAM, a 1GHz processor, and a 128MB 
graphics card. 


Notebook — A notebook (aka laptop) is a 
battery- or AC-powered PC This portable 
computer is generally smaller than a briefcase 

Subnotebook — This is a notebook computer 
that weighs 4 pounds or less. Generally, these 
computers have external disc drives to cut down 
on size and weight. 

UMPC (Ultra-Mobile PC)— Created by Mi- 
crosoft, a UMPC is lightweight (weighing 2 
pounds or less) and uses a hard drive to store 
all of its data. UMPCs run the Windows Vista 
operating system. 

MID (mobile Internet device) — The MID is be- 
tween a handheld computer and a UMPC in 
terms of size and can provide the same enter- 
tainment and information features as UMPCs. 


$600 will get you: 

• A standard-sized notebook 

• A 2GHz or less dual-core processor 

• 2 to 3GB of RAM 

• 1 60GB of hard drive space 

• Vista Home Basic 

$1,000 will get you: 

• An ultra-portable or standard-sized 

• A 2GHz dual-core processor 

• 3 to 4GB of RAM 

• 250 to 320GB of hard drive space 

• Vista Home Premium 

$2,000 will get you: 

• An entertainment, standard-sized, or ultra- 
portable notebook 

• 2.1 to 2.2GHz enhanced 
dual-core processor 

• 4GB of RAM 

• 400GB of hard drive space 

• Vista Home Premium or Ultimate 

20 January 2009 / 

Tech To Go 


This tablet PC serves up 
ultraportable ideas — with 
a twist 

ThinkPad X200 Tablet 

For versatility on the go, it's hard to beat a convertible tablet (that is, one that features a swivel screen and 
works as either a notebook or a tablet PC) that, in addition to everything you'd expect from a business 
notebook, delivers a rich multimedia experience, a bright screen that works indoors or outside, and runs for 
up to 103 hours on a single charge. That's what you get with Lenovo's new ThinkPad® X200 Tablet. It also 
features a heavily tested quad-alloy hinge, shock-mounted storage, and magnesium-alloy covers so you can 
make use of all the X200's flexibility without worrying about wear and tear. 

In addition to the specs listed on the right, the X200 includes a SmartCard reader, built-in Wi-Fi connectiv- 
ity, and a 4-cell Li-Ion battery. Upgrade options include integrated AT&T Mobile Broadband for 3G cellular 
connectivity, a 2GB Intel Turbo Memory hard drive cache, Bluetooth®, a fingerprint reader, a 1.3MP inte- 
grated camera, and an 8-cell Li-Ion battery. 

Key Facts 

• Power Management and 
BatteryStretch features 
permit greater efficiency 
and up to 10.3 hours of 
battery life 

• Innovative options include 
GPS, WiMAX, and Ultra- 

• Improved stereo speaker 
performance combined 
with an optional inte- 
grated camera and dual- 
array digital microphones 
provide an intense multi- 
media experience 

• Different display options 
match various users' 
needs; all panels feature 
wide viewing angles com- 
bined with very low reflec- 
tivity to keep users 
productive even outdoors 

Tech Specs 

• 1 2.1 -inch WideView 
WXGA display (Multi- 
Touch + MultiView LED 
backlit optional) 

• 3.5 pounds (with 4-cell 

• Choice of Intel® Core™ 2 
Duo processors 

• Genuine Windows® oper- 
ating systems available 

. 1GBPC3-8500DDR3 
SDRAM (upgradeable to 
4GB 1066MHz DDR3) 

• 80GB hard drive (upgrade- 
able to 200GB; 64GB or 
128GB solid-state drive 


$1,894 base price | Lenovo | www.lenovo.conn 

PC Today / January 2009 21 

Tech To Go 


The new MacBook Air 
adds more power without 
losing its thinness. 



Image courtesy of Apple 

MacBook Air 

Other vital specs aside for the moment, take note of two key aspects of Apple's newest MacBook Air: It 
runs for up to 4.5 hours on a single charge, and it contains a revolutionary graphics processor that, with 
16 parallel processing cores, serves up five times the 3D performance as previous MacBook models. 
What's more, the Air hasn't gained any weight; at an even 3 pounds, the MacBook Air retains slim di- 
mensions of 0.16-0.76 x 12.8 x 8.94 inches (HxWxD). 

The newest model also comes with a 50% increase in storage space, offering a 120GB 4,200rpm SATA 
hard drive standard or an optional 128GB solid-state drive. The MacBook Air comes with your choice of 
a 1.6GHz or 1.86GHz Intel* Core™ 2 Duo processor and features 2GB memory, Bluetooth® 2.1 +EDR, and 
Wi-Fi (802.1 1a/b/g/Draft N) connectivity. The specs are impressive, but pick up a MacBook Air and 
you'll be equally impressed with its construction, LED-backlit display, and backlit keyboard. 

Key Facts 

• Still ultrathin, Apple's 
newest MacBook Air adds 
more graphics power and 
50% more storage capacity 

• The LED-backlit display of- 
fers not only a perfect 
picture, but also an envi- 
ronmentally friendly one, 
as it contains no mercury 
or arsenic 

• Don't let its thinness fool 
you; each MacBook air is 
constructed from a single 
piece of anodized alu- 
minum for incredible 

Tech Specs 

• 13.3-inch widescreen LED- 
backlit display with 1,280 x 
800 resolution 

• 3 pounds 

. 1.6GHz Intel* Core™ 2 Duo 
processor (1.86GHz op- 
tional) with 6MB shared L2 
cache and 1,066MB front- 
side bus 

. 2GB 1,066MHz DDR3 

• Mac OSXvl 0.5 Leopard 
. 120GB SATA hard drive 

(128GB solid-state drive 

• AirPort Extreme Wi-Fi 
(802.1 1a/b/g/DraftN) 

• Bluetooth" 2.1 +EDR 
. USB 2.0 port 

• Mini DisplayPort for video 

• iSight video camera 

$1,799 base price | Apple | 800-MY-APPLE | 

22 January 2009 / 

Tech To Go 


Intel® Centrino™2 with 
Wi MAX makes this note- 
book ready for the future. 


Wouldn't it be nice to hitch your notebook onto a public wireless Internet connection and browse with the 
same blazing-fast speed you're accustomed to in the office or at home? That's the promise of WiMAX, now 
available in the Baltimore, Md., area through Sprint and scheduled to debut in other major cities in the 
coming months. The ASUS M50Vm-A1 WM is ready to help you get in on the WiMAX action. It includes 
the Intel® Centrino™ 2 wireless module, the first to combine WiMAX and Wi-Fi for flexible Web access. 

If cutting edge is what you want, the ASUS M50Vm-A1 WM delivers in other ways, too. Its Splashtop feature 
lets you "boot up" the system in a special Linux mode. This gives you instant access to Express Gate applica- 
tions that let you browse the Web, play digital music, and use a VoIP or chat client, all without having to 
start up Windows. The notebook also includes plenty of processing power, with an Intel® Core™ 2 Duo 
P8400 that cranks out 2.26GHz worth of speed. 

Key Facts 

Numeric keyboard allows 
users to instinctively enter 
numbers without 

Built-in Web cam supports 
high-resolution imaging 
right out of the box 
Built-in AuthenTec finger- 
print scanner with 
TruePrint® technology 
reads from the live layer of 
skin, preventing common 
skin surface conditions 
from impairing scanner 

Tech Specs 

15.4-inch LCD Color Shine 
display with WXGA+ 
(1,440 x 900) resolution 
6.5 pounds 

2.26GHz Intel® Core™ 2 
Duo Processor P8400, 
1066MHz, 3MB L2 cache 
Windows Vista® Business 
4GB DDR2 800MHz (2GB 
x2); supports up to 4GB 

250GB 5,400rpm SATA 
hard drive 

Super Multi optical drive 
Bluetooth® 2.1 +EDR (op- 
tional); Intel® WiMAX/ 
WiFi Link 5100 
Nvidia® GeForce® 9600M 
GS, external 1GB VRAM 

Rock Solid . Heart Touching 

$1,399 | Asus | 

PC Today / January 2009 23 

Tech To Go 

Quick Guide To 

Mobile Gear 

by Tessa Breneman 

There are plenty of gadgets and accessories to help you stay on top 

of your workload and your personal life. Here are some tips for purchasing mobile gear. 

BEFORE you run off to purchase extra storage for any device, determine exactly 
what you need. You'll have your choice of several types of expandable memory cards, 
including Compact Flash, SD, SDHC (High Capacity), microSD, microSDHC, xD-Picture 
Card, and Memory Stick. 

To determine which memory card is compatible with your gadget, consult the device's users 
manual or the manufacturer's Web site. Most memory card manufacturers will provide a list of cards 
that are well-suited for a specific make and model of consumer-electronic devices, be it a digital 
camera, MP3 player, mobile phone, smartphone, or handheld PC. 


MOBILE broadband uses cell phone signals to connect your mobile phone and 
notebook to wireless high-speed Internet connections. The top wireless car- 
riers — AT&T, Sprint, T-Mobile, and Verizon — each operate on different mobile broad- 
band connections. 

GSM (Global System for Mobile Communications) and CDMA (Code-Division Multiple Access) are 
the two available types of mobile broadband networks. CDMA is generally faster than GSM and can 
handle more users on a given frequency. GSM, however, has better global coverage and gives you a 
better connection should you be in a location with obstructed signals. 

TO MAKE the most of your mobile device, be sure it's properly accessorized. 
Consider how and where you use your electronic devices. If you're a gym rat, for ex- 
ample, you'll want a comfortable armband and lightweight headphones for your digital 
audio player so you can focus on your workout and not fumble with your device. If you 
spend a lot of time in your car, a Bluetooth headset and dashboard mount for your smartphone will 
guarantee you keep your eyes on the road. If you are constantly on the go, a portable mouse is an 
ideal addition to your laptop bag. Finally, every traveler with mobile gear can benefit from a mobile 
power pack that lets him power several mobile gadgets at once. 

WHETHER you want to listen to tunes on your iPod or chat on your phone, you'll 
need comfortable earphones or a headset. Headsets are useful when paired with 
Bluetooth technology because you can chat on the phone wirelessly. 

Depending on your personal preferences, you can find earphones that rest on the outside of 
your ear or earbuds that rest inside the ear. Additionally, you'll encounter noise-cancelation tech- 
nology, which cuts down on the ambient noise. Passive noise-canceling technology uses physical ma- 
terial to block noise, while active noise-canceling technology uses incoming sound waves (noise) and 
the sound waves produced by the active noise-canceling headsets to cancel each other out. 


Road warriors, like your- 
self, can benefit from 
a digital camera to keep 
track of all the places 

terms to know as you 
compare models. 

Digital zoom — You 

can use your camera's 
digital zoom to magni- 
fy and crop images re- 
corded on your camera. 
Your photos are inter- 
polated with pixels, so 
some of the quality 
of an image could be 
compromised through 
this process. 

Megapixels — This num- 
ber determines how 
large your photo prints 
will be. Note that a 
high megapixel count 
does not equate high- 
quality photos. 

Optical zoom — This 
feature lets you physi- 
cally move the lens to 
make your subject ap- 
pear larger in the pho- 
tograph. When it comes 
to optical zoom, a high- 

Resolution — A high 
resolution means more 
pixels and more detail in 
an image; therefore, the 
higher the resolution, 
the higher the quality. 

24 January 2009 / 

Tech To Go 


Enjoy effortless naviga- 
tion and put your favorites 
at your fingertips. 

Maestro™ 4370 

Imagine having all your favorite destinations on one screen, each with its own distinctive icon. That's what you 
get with the new OneTouch™ menu, featured on the Magellan Maestro 4370 (sold exclusively at Best Buy). Sim- 
ply customize the OneTouch™ icons to display the points of interest you want easy access to— restaurants, air- 
ports, banks, businesses, and so many more— and the Maestro 4370 will get you there easily with announced 
street names and directions, voice guidance, lane guidance, and 3D buildings. With preloaded maps of the en- 
tire U.S., Canada, and Puerto Rico and 2GB map storage, the Maestro 4370 is the perfect traveling companion. 
And with 6 million points of interest, the question isn't How do I get there? but Where do I go next? 

Key Facts 

. 4.3-inch WVGA color 
touchscreen provides 
clear, crisp on-screen 
graphics and seamless 
touch pane 

• OneTouch™ menu lets you 
create shortcuts to your 
favorite destinations, 
points of interest, and 

• The device announces 
street names and direc- 
tions at each turn 

• Bluetooth® compatibility 
enables hands-free calling 
with compatible phones 

• Lane guidance makes for 
confident highway driving 

• Pedestrian mode allows 
you to continue on your 
route once you've parked 
your car 


$499.99 | Magellan | www.nnagellangps.conn 

PC Today / January 2009 25 

Tech To Go 

Denon Model AH-NC732 
Noise Canceling Headphones 

If you are a frequent business traveler or commuter and you really love your music, the last thing you want 
is interruption from, say, airplane jet noise, the screech of the subway, or just the constant hum of everyday 
life. Denon's new luxury-class Model AHNC732 Noise Canceling Headphones offer the perfect solution. 
The stylish, lightweight headphones transport you to a peaceful, music-filled world of your own. A special 
acoustic optimizer and 40mm driver unit produce rich, well-balanced, and dynamic sound, from the high- 
est highs to the richest, deepest bass. You will always enjoy a thrilling audio experience, whether you're lis- 
tening to Hendrix or Handel. 

Key Facts 

• Reduces outside ambient 
noise by more than 99% 

• Ergonomic design fits 
comfortably over the ears, 
enhanced by soft leather 
outer coverings and ure- 
thane foam padding 

• Extended battery life pro- 
vides up to 40 hours per 

• Included cables offer two 
different lengths: a 27.5- 
inch version for conven- 
ient "tangle-free" use with 
your portable player, and a 
59-inch version that's ideal 
for relaxed use in airplane 

• Handy foldable construc- 
tion makes for total porta- 

• Durable carrying case lets 
you put everything you 
need— headphones, all of 
your accessories, and your 
portable music player— in 
one place 

SPECIAL OFFER: Visit us at 
and receive FREE shipping on the 
AH-NC732! Offer expires 
December 31, 2008 


$299 | Denon | 

26 January 2009 / 

Tech To Go 


This durable yet tiny 
scanner offers impressive 

H ow to Deai 

ScanSnap S300 

One thing mobile professionals shouldn't have to worry about is paper. With the ScanSnap S300, Fujitsu's 
smallest double-sided ADF (Auto Document Feeder) scanner, all you have to do is load the paper and press 
the Scan button. The device scans both sides of each document simultaneously and automatically converts 
the content into a searchable PDF file. If you're familiar with other ScanSnap models, note that the 
ScanSnap S300 is half the size of the rest. But despite its extremely portable size, the ScanSnap S300 can 
handle up to 56-pound document sheets; combine that with duplexing, and it's an ideal mobile device for 
scanning business cards and documents on the go. 

Key Facts 

Easy-to-use one-button 

Can be powered through 
two USB ports when an 
AC power source is not 

Instantly creates search- 
able content from your 

Automatic document 
feeder holds up to 10 

Scans anything from stan- 
dard or legal-sized docu- 
ments to thick business 
cards and postcards 


$295 | Fujitsu | 

PC Today / January 2009 27 

Tech To Go 


If Apple® sold a stylus, it 
would look like this. 

Pogo iPhone Stylus 

In case you haven't noticed, the iPhone's™ glassy, touch-sensitive screen is only sensitive to your stubby little 
fingers. This is because it uses a technology called capacitive touch, which measures the flow of electrons 
through your skin. The problem is, last time we checked, our fingers were pretty rounded and not too pre- 
cise at picking out tiny URLs in Safari. Luckily, the geniuses behind the Pogo iPhone Stylus have solved this 
problem by developing a stylus that tricks the iPhone into thinking the stylus is really a finger. How do they 
do it? Frankly, we're not sure, but hopefully it doesn't involve grave-robbing. 

Key Facts 

• Soft tip protects your 
iPhone™ from scratches 
and smudges 

• Sleek aluminum-alloy 
design provides style and 

• Laser-engraved graphics 
set off the smooth, 
anodized finish to its best 

• Available in four stylish 

• Works with gloves and 
nice fingernails 

• Handy clip keeps your 
stylus secured to your 


Ten One Design 

$19.95 | Ten One Design | 

28 January 2009 / 

Tech To Go 


The ultimate keyboard for 
your laptop. 

Matias Folding Keyboard 

The Matias Folding Keyboard is a full-sized USB keyboard that folds in half for travel. Small enough to fit in 
your laptop bag, it's the ultimate keyboard for laptop users. High-quality dome switches give the keyboard 
a responsive, tactile feel, with enough resistance to hold the weight of your hands. This reduces long-term 
fatigue and makes it a lot more comfortable to use. A TAB key on the number pad allows one-handed 
number entry into forms and spreadsheets, leaving your other hand free to hold or flip through informa- 
tion being entered. The keyboard also has the standard volume controls: Volume Up, Volume Down, and 
Mute, as well as function keys, page navigation keys, and cursor keys. 

Key Facts 

• Small enough to fit in your 
laptop bag 

• Unfolds into a full-sized 
desktop keyboard, com- 
plete with number pad 

• Comfortable, tactile feel 

• One-year limited warranty 

• Includes, Matias Folding 
Keyboard, USB cable, 
carrying sleeve, and users 


$69.95 I Matias I (905) 265-8844 I 

PC Today/ January 2009 29 

Tech To Go 


You can't afford to miss 
out on 100,000+ Wi-Fi 
hotspots worldwide. 

Boingo Wireless 

Boingo is the world's largest network of Wi-Fi hotspots— with more than 100,000 locations around the globe. 
Whether you want to get online with a laptop or smartphone, Boingo keeps you connected at airports, 
hotels, coffee shops, and more— all at broadband speeds. Best of all? The price: just $9.95 per month for a lap- 
top account that gives you unlimited access throughout North America or $7.95 per month for a smartphone 
account that gives you unlimited access worldwide. With plans like that and a schedule like yours, you can't 
afford not to use Boingo. 

Key Facts 

One Boingo account pro- 
vides access to more than 
100,000 Wi-Fi hotspots in 
airports, hotels, coffee 
shops, and more 
Free Boingo software- 
available for both the Mac 
and PC— makes it easy to 
connect; the software 
automatically alerts you 
when you are in network 
and logs you in with a 
single click 

Have a smartphone with 
Wi-Fi? Boingo Mobile 
gives your phone access to 
thousands of hotspots, so 
you can enjoy browsing 
the Internet, downloading 
music, and connecting to 
email at broadband 

Boingo Mobile is available 
for the iPhone and iPod 
touch, the Windows Mo- 
bile platform, Nokia S60 
phones as well as Nokia's 
N800 and N810 tablets, 
Sony Ericsson UIQ, and 
Motorola Windows 
Mobile phones 


Don't iust ao. Boinao. **& 

Don't just go- Boingo. 

Prices vary | Boingo | www.boingo.conn 

30 January 2009 / 

Tech To Go 


Eye-Fi Share is the world's 
first wireless, Web sharing 
SD memory card. 





make your camera wireless 

automatically save and share photos to your 

Eye-Fi Share 

The Eye-Fi Share is a wireless memory card that automatically uploads your photos from camera to 
your computer and favorite photo sharing Web site— no cords or cables needed. Simply turn on 
your camera when you get home and your photos will wirelessly upload through your Wi-Fi net- 
work. Eye-Fi works with any digital camera that accepts an SD memory card; just swap your cur- 
rent card with the Eye-Fi Share to transform your camera into a "wireless" one. Eye-Fi Share users 
can also upgrade their cards to add Wi-Fi hotspot access and geotagging capability for an annual 
service fee. 

Key Facts 

• Wirelessly uploads 
photos to your com- 
puter and favorite 
photo sharing Web site 

• Automatically uploads 
to one of more than 25 
online photo sharing 
sites like Shutterfly, 
Facebook and Flickr 

• PC and Mac compatible 
with 2GB storage 

• Works with any digital 
camera that uses an SD 
memory card 

• Add Geotagging Serv- 
ice: Eye-Fi Share users 
can upgrade their card 
to geotag photos with 
geographic information 
about where a photo 
was taken (annual serv- 
ice fee of $14.99) 

• Add Hotspot Access: 
Eye-Fi Share users can 
upgrade their card to 
automatically upload 
photos away from 
home at more than 
10,000 Wayport 
hotspots (annual 
service fee of $14.99) 

• Has a range of 90-plus 
feet outdoors and 45- 
plus feet indoors 

• Resizes images if re- 
quired by the selected 
online destination 

• Advanced power man- 
agement optimizes the 
use of the camera's 


$99.99 | Eye-Fi | (877) 873-9334 | 

PCToday / January 2009 31 

Tech To Go 


Data mobility without 

D mailer 

sync v.B 

Welcome jA 
Read EULA ^_ 
Installation Path fjgfj 
Create profile and A 

Tr.H .ruire!-;: 'older being synchronized and encrypted is: feedback V7 

^ Copy Email - chris.laniit( - Re: Be the first to disco... 
<• Copy Email - d ma ile - Re: Be the first to discover Dmailer v7! 


■S Synchronization '.J \ 1 

1/ Copy Email - Quietpc - RE: Be the first to discover Dmailer v7! 
it Copy Email - Confirmation from - Re: Be the first to ... 
1/ Copy Email - paulitoSmachadodecarvalho. - Re: [Be the first to di... 
1/ Copy Email - Didrik Holstensson Kvist - Re: Be the first to discover Dm... 
iS Copy Email - Cliff A rn out - Re: Be the first to discover Dmailer v7! 
^/ Copy Email - Hail Delivery System - Undelivered Hail Returned to Sender 
<S Copy Email - Maxwell, Paul (NESL) - Out of Office Auto Re ply: Be the fir... 
*S Copy Email - Boker, Francisco - Out of Office AutoReply: Be the first t... 
1/ Copy Email - Kilbourn, Kelvin - Out of Office AutoReply: Be the first t... 
*/ Copy Email - Tucker, Brent (MAN-Corporate) - Out of Office AutoReply: B... 
y? Copy Email - Abwesenhe .:s>r ::e i-i-.g Re: Be the first to... 
^/ Copy Email - Fred Stam - Out of Office AutoReply: Be the first to disco... 



^^^^ *| powered by 

^^. Dmailer 

Dmailer Sync V8 

Your PC in your pocket: Dmailer Sync is perfectly suited for mobile professionals who need the ability to 
work on any computer as if at their own, no matter where they go. Easy to use and always secure using 128- 
bit encryption and password protection, Dmailer Sync allows users to synchronize personal files, browser 
(Internet Explorer and Firefox) favorites, and wallpaper, as well as all data contained in Outlook®, Outlook 
Express or Windows Mail™ (email, attachments, folders, etc.) from a PC to any mobile storage device. It 
leaves absolutely no trace behind (no cookies, temp files, or history files), ensuring a user's information is al- 
ways kept secure. 

Key Facts 

• Save your Microsoft 
Outlook® or Windows 
Mail™ files, contacts, cal- 
endar entries, photos, 
videos, and files to any 
(portable) storage device 

• Create a synchronized 
copy of your Outlook on 
your portable device 

• Work via Dmailer Sync on 
any PC anywhere, anytime 

• Synchronize everything 
when you get back to 
your PC 

• Send and receive email in 
just one click with auto 
detection of your email 

• Use new email sync 
options to sync by date 
and size 

• Use the new Restoration 
feature to transfer your 
data from PC to PC 

• Enjoy lock-tight security 

Aj powered by 


Sync your life® 

$39.95 I Dmailer I 

32 January 2009 / 

Tech To Go 


Integrates local and 
secure off site backup for 
disaster recovery. 

Barracuda Backup Service 

The Barracuda Backup Service is an affordable, integrated local and offsite data backup and disaster recov- 
ery solution. Designed for organizations of any size, the Barracuda Backup Server creates a local copy of 
data and efficiently transfers the data offsite without placing additional burden on production servers. Off- 
site storage is monitored and managed by Barracuda Central as part of the monthly Barracuda Backup Sub- 
scription. The Barracuda Backup Service includes technical support and emergency assistance with restores 
in the event of a system failure or disaster. Combining local and offsite storage provides the best of both 
worlds— onsite backups for the fastest restore times and secure, offsite storage for disaster recovery. 

Key Facts 

• Offsite backup to two 
geographically separate 

• Secure data transfer to off- 
site data center 

• Redundant disk-based 

• Best-of-breed data reten- 
tion policies 

• Single transfer from loca- 
tion to save bandwidth 

• Centralized Web interface 
for granular controls 

• Detailed, easy-to-use 
reports and usage graphs 

• Quick and easy restoration 
from Web interface 

• Fully featured client soft- 
ware for advanced data 

• Direct FTPS data access 
with point in time restore 



Pricing starts at $99 per month | Barracuda Networks | (888) 268-4772 | 

PC Today / January 2009 33 

Mobile & Wireless Security 




The Power Is Yours 




Mobile & Wireless Security 

The advent of the wireless hotspot has been an invaluable 
boon to virtually every computer user, especially those 
who prefer to work away from home or the office, as well 
as frequent travelers. What did any of us do before we 
were able to hop online to check our email in a coffee shop 
or connect to our company's VPN (virtual private net- 
work) to access the office network while waiting for a flight? 

Yet with every technological 
innovation comes a caveat. In 
this case, that caveat is security. 
As convenient as it is for every- 
one to leave their wireless net- 
works unsecured so others can 
freely access them, doing this 
can be quite dangerous. If left 
unprotected, it's relatively easy 
for someone to intercept the 
data you're transmitting or even 
gain control of your computer 
or network. 

It takes two to tango, as the 
saying goes, and this is certainly 
true when it comes to hotspot 
security. It's the responsibility 
of both the hotspot provider's 
network administrator and the 

person using the wireless net- 
work (you) to ensure that a hot- 
spot is used safely. 

Set Yourself Up 
For Success 

Unfortunately, you have very 
little control over the people 
managing a hotspot. What you 
can do is safeguard your com- 
puter so you can use hotspots 
without fear of opening your 
computer to everyone. 

Make sure that your firewall 
and anti-malware software is 
running and has all the latest 
updates. Your firewall will 
keep intruders from gaining ac- 
cess to your computer — just be 

sure to set your firewall to 
block all incoming traffic — and 
your anti-malware software 
will stave off most attacks. 
Also, keeping your notebook's 
operating system and software 
updated with security patches 
and other updates will give 
your computer an additional 
layer of protection. 

If your notebook is config- 
ured to automatically locate and 
connect to the closest available 
network, you'll want to disable 
this feature. Windows XP and 
Vista will alert you when you're 
about to connect to an unknown, 
unsecured network. You can 
override this feature if you 

desire, but we think it is an 
unwise move because your com- 
puter could automatically con- 
nect to an unsecured network 
and leave your system vulner- 
able without your knowledge. 

It's actually a good idea to 
turn off your computer's wire- 
less radio when you're not using 
the Internet. Not only does it 
preserve battery life, but it also 
prevents anyone on that wireless 
network from potentially con- 
necting to your computer. 

To protect your computer 
from potential intruders, we 
also suggest that you disable file 
and printer sharing. Remember, 
when you access a hotspot, 
you're on a network. There's no 
reason to leave your data ex- 
posed to vulnerabilities by 
sharing your files with other 
people using that same net- 
work. To disable file and printer 
sharing in WinXP, click Start, 
select Control Panel, and click 
Security Center. Next, Click 
Windows Firewall and then 
select the Exceptions tab in the 

Data Thief's Computer 


If you're using a hotspot that isn't encrypted, a data thief can easily 
intercept and view the information you're sending over the network. 

Data Thief's Computer 


An encrypted network makes your data undecipherable to anyone 
who would try to view it. 

PC Today / January 2009 35 

Mobile & Wireless Security 

resulting dialog box. Deselect 
the File And Printer Sharing 
checkbox and click OK. (Steps 
will vary slightly if you are 
working in the Control Panel's 
Classic View.) In Windows Vista, 
click Start, select Control Panel, 
click Network And Internet, and 
choose Network And Sharing 
Center. Click On or Off next to 
File Sharing. 

You can also choose to make 
the folders on your notebook 
unavailable to other users on a 
network. Hackers will also have 
a difficult time accessing your 
files if you make them private. 
To make your folders private, 
you need to set permissions. 
Right-click a folder, select Prop- 
erties, click the Sharing tab, and 
set the options you prefer. 

To keep your Web browsing 
secure, consider removing sen- 
sitive data from your notebook 
altogether. The news is rife with 
horror stories of laptops be- 
longing to government officials 
or financial institution em- 
ployees being stolen or mis- 
placed. In many cases, these 
computers contain Social Secu- 
rity numbers, banking records, 
account numbers, and other in- 
formation you wouldn't want to 
share with your neighbor, let 
alone a cyber thief. It's not 

much more difficult for said 
cyber thief to snatch this kind of 
data from you if you're using an 
unsecured hotspot. 

Instead, keep that data saved 
on your company's servers 
(and, by proxy, behind the cor- 
porate firewall) and off your 
hard drive. Use your compa- 
ny's VPN to access those files 
when necessary. This way, you 
have multiple safeguards in 
place — not only the encryption 
of the VPN, but also a firewall 
on the other end. 

Also, be careful to avoid 
granting anyone physical access 
to your computer. Seem like a 
no-brainer? It certainly does, 
until you let your guard down 
and decide to leave your note- 
book unattended briefly while 
you run to the restroom at the 
restaurant— because no one who 
appears suspicious is in sight — 
and return to an empty table. 
Furthermore, any time you use a 
public computer, such as one at 
a library, remember that hackers 
can easily look for remembered 
passwords on commonly used 
Web sites such as those for 
Web email, banks, and credit 
card companies. If hackers get 
their hands on the hard drive 
somehow, there are even more 
goodies awaiting them. 

Connect To & Use A 
Secure Network 

Secure networks require a 
key before you can log on. 
Only the network adminis- 
trator can provide this informa- 
tion, but if you're in a business 
establishment, one of the em- 
ployees can get you the code in 
most instances. This is a good 
thing because it means the es- 
tablishment has encrypted its 
network so only approved 
users can connect. 

Granted, this doesn't neces- 
sarily improve the type of person 
using the network. For example, 
there's no reason a hacker can't 
pay $5 for a latte at the same 
local coffee chain as you and 
connect to the same network. 
However, if you're on an en- 
crypted network, your data is 
unreadable — even by other users 
on that network. 

When using the Internet at a 
hotspot, it's generally a good 
idea to stick to visiting secure 
Web sites. Try to avoid con- 
ducting any sensitive business, 
such as online banking, while 
using a public network. But, if 
you must complete that bank 
transaction, be sure you're on a 
secure site. One way to deter- 
mine if a site is secure is if it has 

the small padlock icon on the 
bottom right of the screen. You 
can also check the URL; if it be- 
gins with https, it is secure. 

How They Do It 

Data snoops have a relative- 
ly easy time accessing a sys- 
tem if their target works on an 
unsecured network. Because 
Wi-Fi technology works by 
broadcasting packets of data 
over radio waves between two 
sources, it is easy for someone to 
intercept that data. 

One common technique data 
thieves use to access another 
computer user's data is to set 
up a network with an official- 
sounding name, such as "New 
York City Wi-Fi." This is known 
as an evil twin, which is an ille- 
gitimate network designed to 
mimic a Web site that people 
would normally use, such as a 
municipal network in a metro- 
politan city. 

Some data thieves will target 
a public computer, such as a 
kiosk, using a keystroke logger 
(or keylogger), which records 
keystrokes in order to steal 
passwords and other useful in- 
formation. You can circumvent 
this problem by using a pass- 
word manager on a thumb 
drive to enter your passwords 









This setting bio 

;ks all outside sources from 
he exception of those sele 


-■:'■' : 


□ Don't alio 


Select this 

^hen you connect to public 
1 'rr * m -I-' N „, '" 








— " 

setting. Turning off Windo 




« Firewall ,s using j, 

our domain settings. 


OK I Can, 

Before you use a public hotspot, 
be sure your firewall is enabled 
and up-to-date. 

...... '*s Advanced 


■ •■. ' ' .■". 


j CMH (Automatic) 

;:,■■: - : ■::.,;. ■-,;.-; 




Choose a wireless network 

• to access 

■•. : .'-■■: :• " ' - - '-; .-;;• - . •'•.. ■■: •;."" ; 
Acces; ::<:' '. 'norks only 

□ Automatically cc 

f Close 

[ OK | | Cancel 

Make sure Automatically Connect To 
Non-Preferred Networks is unchecked. This 
will prevent you from accidentally connecting 
to a vulnerable hotspot. 

11 Set up a w ! .- 
for a home or . 

delated Tasks 

he order of 

vVhen possible, always try to connect to a secure 
network, which will display a lock icon and will 
require a password to connect. 

36 January 2009 / 

Mobile & Wireless Security 

automatically, thus foiling a 
keylogger. (If you do use this 
technique, be sure you take 
your flash drive with you when 
you're done using the kiosk or 
public computer.) 

What Are The Dangers? 

So, now you know how to 
protect your notebook when 
using hotspots. But you may be 
wondering what the big deal is 
and whether it's really worth all 
the trouble. Some people may 
tell you that leaving your data 
or notebook unprotected on an 
unsecured network is like 
leaving the doors to your house 
unlocked. The fact of the matter 
is, using an unsecured network 
is more akin to leaving the 
doors to your home wide open. 
The casual passer-by with any 
eye at all toward thievery will 
have no trouble dropping by to 
retrieve some sensitive data. 

Using your firewall and anti- 
malware software, accessing 
important files via your compa- 
ny's VPN, viewing secure Web 
sites only, and connecting only 
to secure hotspots will keep 
your computer and informa- 
tion safe. It's like closing and 
locking your doors, installing a 
security system, and getting a 
guard dog. 

ddPort... j [ Edit... "] 


i ° k i r^ 

When configuring your 
Windows Firewall, click the 
Exceptions tab and deselect 
File And Printer Sharing. 

Encryption Types 

| hen it comes to securing 
a hotspot, there are dif- 
ferent encryption types, with 
varying levels of protection. The 
following are the most common. 

WEP (Wired Equivalent Pri- 
vacy) is better than nothing, 

and it will deter the casual 
data eavesdropper, but it's the 
weakest level of security avail- 
able. WPA (Wi-Fi Protected 
Access) is much better than 
WEP and uses the TKIP 
(Temporal Key Integrity 

Password Protection 

rotectmg your passwords 
i goes a long way toward 
computer security. Don't keep 
a list of your passwords in a 
file on your computer (or any- 
where else for that matter); if 
a hacker manages to find that 
one spreadsheet on your sys- 
tem, you might as well hand 
him your Social Security card. 
Also, when you set up a pass- 
word for any account you use 
online, make it one that's dif- 
ficult to crack. Don't use 
passwords containing, for 
example, a loved one's name 

or birthdate, a pet's name, or 
anything else in your life 
someone could guess. 

It's also wise to use a dif- 
ferent usemame and password 
combination for every account 
you have; granted, this can be 
difficult because most people 
have many online accounts, but 
it is the safest way to protect 
yourself. Suppose someone 
found out your preferred user- 
name and password from some 
Web site you have an account 
on that has lax security? All that 
a person would have to do is 

Troubleshoot A Connection 

A fter you've updated every- 
thing, set your firewall 
into motion, and readied your- 

work, you may find that you're 
unable to connect to the net- 
work. It's a frustrating state of 
affairs, to say the least. 

Make sure your system's wire- 
less radio is turned on. In the ac- 
companying article, we mention 
how it is a good idea to leave the 
wireless radio turned off to pre- 
vent your system from con- 
necting to open networks and 
to preserve battery life. If you're 
having trouble connecting to 
your hotspot, check that you en- 
abled the radio. Also, make sure 
your network drivers are up-to- 
date; if you installed all the latest 

automatic Windows updates, 
you should be good to go. 

If all else fails, let Windows 
attempt to troubleshoot the 
problem for you. In Windows 
XP, you can use the Network 
Connections area in Control 
Panel. Click Start, select Control 
Panel, click Network And In- 
ternet Connections, and then 
select Network Connections. 
(Steps will vary if you are 
working in the Control Panel's 
Classic View.) Right-click any of 
the network connections listed 
and select Repair. In Windows 
Vista, you'll access the Windows 
Network And Sharing Center. 
Click Start, select Control Panel, 
click Network And Internet, and 
then select Network And 

Protocol). Even better is WPA2, 
which uses AES (Advanced 
Encryption Standard) and 
CCMP (Counter Mode with 
Cipher Block Chaining Mes- 
sage Authentication Code 
Protocol) encryption. 

find out what Web sites you 
might frequent and punch 
in that information at every 
login screen. 

You can also come up with 
a password system, or a set of 
rules that you can apply to any 
type of password need. For ex- 
ample, maybe one of your rules 
includes typing a certain char- 
acter every third letter of the 
password. This would make the 
likelihood of someone cracking 
your password nearly impos- 
sible, but it would be easy for 
you to remember. 

Sharing Center to get there. 
Click the red X to have Win- 
dows diagnose the problem or 
click Manage Network Connec- 
tions, right-click the troubled 
network connection, and se- 
lect Diagnose. 

If you think you're connected 
to the Internet but the network 
is acting as if you're not, try 
pinging a known Web site, such 
as Google. Click Start, select Run, 
type cmd into the Open field, 
and click OK. In the resulting 
window, type ping and a Web 
site URL (in this case and press ENTER. If 
the connection times out, the 
network is your problem, and 
you'll need to speak to the net- 
work administrator. 

Mobile & Wireless Security 

Keep Your 

Data on 


Portable Options 
For Storing Your 

It's no secret that you need a backup 
plan in case your hardware fails. But 
can you be sure that sensitive infor- 
mation won't fall into the hands of 
someone who could exploit you or your 
company if your mobile devices are lost 
or stolen? Maybe you've taken some precautions 
to ensure you can recover your data should some- 
thing happen. It's equally important to keep your 
data out of the reach of individuals looking to use 
any information they find illegally. 

Keep It Online 

Online storage and backup 
services have gained popularity 
in recent years, most likely due 
to the benefits of backing up and 
storing data online, and the cost 
to do so remains relatively low. 
Most companies offering online 
storage services charge monthly 
or yearly fees for using their 
server space, and some provide 
a small amount of free storage 
space while charging fees for 
larger storage capacities. 

Online storage and backup 
services can be especially ap- 
pealing to people who travel 
frequently, because those indi- 
viduals can access their files from 
any computer with an Internet 
connection. When you back up 
or store data online, you also 
eliminate the risk of losing that 
information if you experience a 
disaster, such as a fire or flood, 
which could destroy your com- 
puter and your local backup 
hardware. When you use an on- 
line program to back up and /or 

38 January 2009 / 

Mobile & Wireless Security 

store data, the service stores the 
information at server farms lo- 
cated all over the country, or 
even around the world, de- 
pending on the company. 

If you choose to store or 
back up your data to an online 
service, you can be sure that 
your data is secure. The in- 
dustry standard for protecting 
online backup programs is SSL 
(Secure Sockets Layer), which 
creates an encrypted connection 
between Web servers and Web 
browsers. Online backup pro- 
grams will likely offer either 
128-bit or 256-bit encryption 
methods, with 256-bit being 
slightly more secure. 

When comparing online 
backup and storage programs, 
take note that there are some 
online programs that put a cap 
on the size of the file you can 
upload, and there are different 
means of uploading data avail- 
able. Some online programs 
require you to download soft- 
ware, which can be useful or in- 
trusive depending on your 
tastes. When you download 
Carbonite ($49.95 for a one-year 
subscription; www. carbonite 
.com), for example, the pro- 
gram places a small dot on the 

icon for each file, indicating it 
has backed up the file. Software 
can be useful, however, in re- 
gards to managing tasks, such 
as scheduling automatic or 
manual backups and choosing 
which types of files you want to 
back up. 

You won't need to download 
software for all online storage 
and backup programs. Media- 
Fire (free;, 
for instance, lets you upload 
content without having to in- 
stall software. This is a good op- 
tion if you want to store or back 
up files from multiple com- 
puters. Some software-based 
online programs, however, 
only let you back up files from a 
single computer, which is some- 
thing to consider if you use 
multiple computers for personal 
and business uses. 

Security issues. As more 
people use online storage and 
backup programs, some secu- 
rity issues have come to light. 
For instance, if the company 
keeping your information goes 
out of business, what happens 
to your data? Also, although 
many online storage and back- 
up programs offer many layers 
of encryption, one would be 

naive to think that his data will 
always be protected and free 
from any type of cyber attack — 
although a security breach 
would be unlikely. Be sure you 
read the fine print of any user 
agreement to find out whether 
your stored files can or will be 
deleted after a certain period of 
time. Also, find out if your on- 
line program is like MozyHome 
($4.95 per month; www.mozy 
.com), which deletes a file from 
its storage when you delete it 
from your computer. Be sure 
your online storage and backup 
service uses multiple server 
farms, as well. If a natural dis- 
aster were to strike the city 
where the company is located, 
for example, you lessen the 
chances of losing all your data 
after one incident if the com- 
pany does maintain servers at 
other locations. 

Take It With You 

If you'd rather not mess with 
online storage and backup op- 
tions, consider keeping your 
files with you. Portable hard- 
ware, such as portable hard 
drives, USB flash drives, and 
memory cards, are good storage 
devices for travelers thanks to 

their diminutive size and large 
storage capacities. These por- 
table devices, however, are 
sometimes easily lost or become 
targets for thieves. 

Regardless of how careful 
you are, there's no guarantee 
that your portable storage 
device won't fall out of your 
purse or pocket in a taxi, for ex- 
ample, while you rush to make 
your flight. In one incident in 
2005, an unlucky individual 
misplaced a USB drive con- 
taining the names, addresses, 
Social Security numbers, and 
medical records of 120,000 
Wilcox Memorial Hospital pa- 
tients in Kauai, Hawaii, putting 
those patients at risk of having 
their identities stolen. 

Portable hard drives. Por- 
table hard drives are a nice ac- 
cessory to have, because they 
provide a lot of storage space, 
and the devices often use AES 
(Advanced Encryption Stan- 
dard) 128-bit or 256-bit hard- 
ware-based data encryption 
to ensure your data remains 
safe. Makers of portable hard 
drives that put an emphasis on 
security will also often provide 
secure Web browsing through 
portable software suites. This 

1 File Edit Vis Tools Help 


j^E >. : Search Folders jji - 

1 Address ^ Carbonite Backup Drive 



•. -d up Files 

I Other Places * 

t Pending Backup 
4- Recovery Log 

j My Computer 

1 : ;' \ M y Documents 

1 fc_J My Network Places 

1 Details * 


1 Carbonite BackuD Drive 


carbAnite Ca 

rbonite Backup Owe | 


1 . ■ a . . , Files Pending Backup (0 files) 

1 Browse the files in my backup 

1 ._ . , „ ,.. . Files Pending Restore (0 files) 

Files Successfully Restored (0 files) 

View Restore Errors tC fiiesj 
111 HELP 

1 Visit online support center 

1 Chat with a support rep 

Carbonite's menu is positioned under your file folders, so you can 
keep track of which files you backed up. 

:,!,.;■* •:■,'■/■•■'■ 

2/ 7/2008 

Id G J My Computer 
$■■■□« Drive (C:) 

mi ;;.;.- ■ .-.. .' . 
Email and Contacts (Outlook) 
IE Favorites 
Photos and 


DlLj) Word Processis 

' :-.':=' 

I O Overwrite e\: 
J Rename file ii 

MozyHome is an online backup program that requires a software 
download. It has an interface that makes it easy to use. 

PC Today/ January 2009 39 

Mobile & Wireless Security 

Web browser lets you access 
your bookmarks and cookies 
and surf the Web without 
leaving a trace of yourself on 
the host computer. 

Portable hard drives can 
range in price from a little less 
than $100 to about $350, with 
capacities ranging from 160 
to 500GB. Although these de- 
vices are handy for storing large 
quantities of media-rich files 
(such as a digital video collec- 
tion), portable hard drives are 
more susceptible to physical 
damage than USB flash drives. 
A hard drive has many moving 
parts that can damage easily if 
you happen to drop it while 
fumbling around, say, while 
you are standing in line at the 
airport security checkpoint. 
However, there are portable 
hard drives, such as the eGo 
Camo Portable Hard Drive from 
Iomega ($104.49; www.iomega 
.com), that include shock resis- 
tance features to protect the 
fragile interior of the portable 
hard drive. 

USB flash drives. USB flash 
drives are smaller and less ex- 
pensive than portable hard 
drives, yet some models can 
provide several gigabytes of 
storage. In recent years, compa- 
nies have introduced USB flash 
drives touting features that 
keep your critical data sealed 
tight. Like portable hard drives, 
some USB flash drives include 
AES 128-bit or 256-bit encryp- 
tion options. Many offer hard- 
ware-based encryption, while 
some offer less-secure software- 
based encryption. Others, such 
as the Corsair Flash Padlock 
($29.99 for 1GB, $39.99 for 2GB;, include a 
keypad and require a PIN be- 
fore you can unlock the data 
stored on the drive. 

USB flash drives also incor- 
porate added security features 
that portable hard drives in- 
clude, such as secure Web 
browsing. Additionally, like 
some portable hard drives, 
there are a handful of USB flash 
drives that have self-destruct 

features (making the data con- 
tained on the drive unrecover- 
able) if users enter incorrect 
passwords after a specific num- 
ber of attempts. 

Memory cards. Memory 
cards that store data on your 
smartphone or other mobile de- 
vices do not have the integrated 
security features that portable 
hard drives and USB flash 
drives have. Instead, it's up to 
you or your device's manufac- 
turer to integrate an operating 
system or other software ca- 
pable of encrypting data on 
your device. This is very impor- 
tant because devices, such as 
smartphones, often hold infor- 
mation about their owners and 
their contacts, as well as private 
emails and calendars. 

Some mobile OSes, such as 
Windows Mobile 6 and Sym- 
bian, include PGP Mobile in 
their mobile platforms. PGP 
Mobile wraps itself into a mo- 
bile operating system and can 
encrypt individual files, data li- 
braries, archives, or directories, 

which can include your docu- 
ments and things such as con- 
tacts. RIM's BlackBerry OS 
offers its own 256-bit encryp- 
tion, which also protects items, 
such as documents, calendars, 
and contacts. 

Protect The 

Not all portable USB flash 
drives, portable hard drives, 
and other portable storage de- 
vices will have encryption ca- 
pabilities. However, you can 
still protect yourself and any of 
your portable devices, such as 
notebooks or UMPCs, by in- 
stalling and using an encryp- 
tion program. 

PGP Desktop Home ($99 for 
perpetual license; www.pgp 
.com) is one example of soft- 
ware that lets you pick and 
choose the data you want to 
keep encrypted on your desk- 
top or laptop computer. You 
can encrypt volumes of data, 
including your email and AIM 
sessions, and you can create 

'. . . there are a handful of USB flash drives that have self-destruct features if 
users enter incorrect passwords after a specific number of attempts ." 

The Iomega eGo Camo portable hard drive has 
a Drop Guard feature that protects the drive's 
interior mechanics and includes a protective 
rubber exterior designed to cushion the device 
if you were to accidentally drop it. 

ir Flash Padlock 
includes a keypad that 
requires a PIN rather than 
requiring you to add encryp- 
tion software to protect data. 

40 January 2009 / 

Mobile & Wireless Security 

drives (similar to the type of 
drive a removable device cre- 
ates) where you can store all of 
your encrypted documents. 
With PGP, you can also " shred" 
documents, which destroys 
files and folders, making them 
unrecoverable even by data re- 
covery software. 

Another encryption pro- 
gram, TrueCrypt (Free; www, is an open- 
source program you can down- 
load to your computer or onto 
a portable storage device. True- 
Crypt even comes loaded on 
some USB drives, such as the 
16GB Corsair GT Flash Voy- 
ager ($169.99). TrueCrypt can 
encrypt all the data on a stor- 
age device, or it can encrypt a 
hard drive partition using AES 
256-bit technology. 

Best Of Both Worlds 

Some devices let you enjoy 
the benefits of portable storage 
devices and online backup. The 
4GB SanDisk Ultra Cruzer 
Titanium Plus ($29.99; www will automati- 
cally back up your files online 
when you load them onto the 
USB flash drive. In addition to 
the online backup service, you 
can enjoy password protection 
and hardware AES encryption. 
The benefit to having online 
backup on your portable stor- 
age device is that you can easily 
access and restore files online if 
you happen to lose your flash 
drive or you accidentally erase 
the data it contains. 

Online backup and storage 
goes another route with the 
Eye-Fi Home ($79.99; www wireless memory card 
for your digital camera. This 
storage card uses Wi-Fi tech- 
nology, so you can upload your 
pictures to your computer and 
avoid potential physical dam- 
age to the memory card. It's 
also a great way to quickly and 

The Eye-Fi Home wireless memory card 
makes it easier and quicker to transfer 
pictures from your camera to your com- 
puter for safekeeping. 

You get the added 

protection of storing your 

files online, while also keeping 

them on a flash drive, with the 4GB 

SanDisk Ultra Cruzer Titanium Plus. 

conveniently share your photos 
with others. 

Plan Ahead 

There are many types of 
backup and storage options that 
span various price points. You 
don't have to learn the hard way. 
Plan ahead so you, your com- 
pany, and your contacts won't 
face detrimental consequences 
if you do drop your USB flash 
drive in the coffee shop or some- 
one lifts your laptop while you're 
at the airport. 

by Tessa Breneman 

128-bit vs. 256-bit AES Encryption 

ft ES (Advanced Encryption 

password. Each character 

use the allotted characters, 

m\ Standard) uses the same 

of your password is worth 

the rest of the password will 

key for encryption and decryp- 

eight bits; therefore the differ- 

be filled with zeros (making it 

tion. The 256-bit encryption 

ence between 128- and 256-bit 

easier to guess), which is why 

is slightly stronger than 128-bit 

encryption is the difference 

some security experts suggest 

encryption, but the level of se- 

between a 16- and 32-char- 

having a pass-phrase rather 

curity depends more on your 

acter password. If you don't 

than a password. 

Software- vs. Hard 1 

ware-Based Encrypt 


^J oftware-based encryp- 

the software encryption op- 

hardware- based encryption 

%P tion is less secure than 

tions, the encryption key is 

reside within the device and 

hardware-based encryption 

stored in a device's memory, 

not system memory, making 

options due to the location 

making finding the key easy 

the encryption key difficult 

of the encryption keys. In 

for hackers. The keys for 

to find. 

Terms To Know 

AES (Advanced Encryption 

regardless of whether or not 

SSL (Secure Sockets Layer): 

Standard)— This encryption 

the input is identical. 

This is the industry standard 

algorithm is symmetric, which 

for Web sites that require 

means it uses the same key 

ECB (Electronic CodeBook)— 

security, and it forms a link 

for encryption and decryp- 

ECB is the simplest mode of 

between Web servers and 

tion. It can support 128 bits, 

encryption, and it appears in 

Web browsers. To obtain an 

192 bits, and 256 bits using 

such devices as USB flash 

SSL Certificate (which autho- 

block encryption. 

drives and portable hard 

rizes the security), there must 

drives. ECB uses identical 

be a public key (an organ- 

CBC (Cipher Block 

plaintext blocks encrypted 

ization sets this up to en- 

Chaining)— CBC mode is more 

into identical cipher text 

crypt information) and a 

secure than ECB (Electronic 

blocks, which means that it 

private key (determined by 

CodeBook) mode because a 

doesn't hide data patterns. 

you to decrypt your informa- 

unique output is created by 

ECB mode is not as secure as 

tion). SSL includes 128- and 

each input block (your data), 

CBC mode. 

256-bit encryption. 

Mobile & Wireless Security 

Prevention & 
Caution Are Key 

Internet and wireless security has been 
a hot-button topic for many years now, 
with experts continually reminding us 
to use firewalls, install antivirus and 
malware programs, and take other pre- 
cautions. Statistics show the warnings 
are working. The results of a survey by security 
firm Symantec (, released in 
October 2008, indicated that 90% of PC users had 
antivirus software installed, and 82% had antispy- 
ware protection. 

Of those surveyed, 81% indi- 
cated they had firewall software 
in place, and 75% thought they 
had antispam protection. How- 
ever, on those systems where 
Symantec performed a test scan, 
the reality was quite different. 
Only 52% had antispam protec- 
tion, 42% had a firewall, and 
50% had antiphishing software 
in place. 

These statistics are sober- 
ing, given that security experts 
say the Internet is more danger- 
ous than ever. New, vulnerable 

technologies, combined with a 
growing pool of intelligent, in- 
ventive, and greedy malware 
artists, are giving new meaning 
to the concept of threat. 

Interestingly, consumers 
seem to sense their own vulner- 
ability. In the Symantec survey, 
only 26% of respondents said 
they thought their PCs were 
"very safe" from virus inva- 
sion, and only 21% said they 
felt "very safe" from hacker at- 
tacks. If you share these con- 
cerns, you may be surprised to 

42 January 2009 / 

Mobile & Wireless Security 

learn why you might not be 
safe, how you should go about 
ensuring you are, and what you 
should do if something does go 
awry. Fortunately, we can help 
you, provided you're willing to 
help yourself. 

Mobile Mania 

The first question many may 
ask is whether cellular devices 
have caught up with PCs in 
terms of vulnerability and should 
therefore be handled with extra 
care. The answer, according to 
some security experts, is a qual- 
ified "No." According to David 
Marcus, director of security re- 
search and communications for 
McAfee's ( 
Avert Labs, "In North America, 
mobile device security is defi- 
nitely on our roadmap, but we 
don't see [major threats] at this 
point. In China, it's a problem. 
There is a greater prevalence of 
[mobile] malware there than in 
any other place." 

According to Marcus, today's 
intrusion specialists are crimi- 
nals seeking financial gain, not 
students looking to prove their 
coding skills. Many Chinese citi- 
zens conduct currency exchanges 
over their mobile phones, he 
says, making them attractive tar- 
gets. However, like many secu- 
rity experts, Marcus says these 
threats will eventually come to 
visit. "PCs and [other mobile] de- 
vices access the same Internet. 
Once Americans embrace [on- 
line] financial transactions via 
handhelds [and start] paying 
their bills and buying and selling 
through mobile devices, you will 
see more threats. User behavior 
will be the tipping point." 

Some of you who currently 
conduct financial transactions 
using your mobile devices may 
be wondering whether you 
should be worried by this news. 
According to Dan Hoffman, chief 
technology officer at mobile 

phone security firm SMobile 
Systems (www.smobilesystems 
.com), you should err on the side 
of caution. Hoffman asserts that 
many mobile threats have not 
yet been detected because mal- 
ware writers design them to be 
stealthy. (For more on whether 
your mobile phone and its con- 
nections put you at risk, see the 
"Prudence Over Risk?" sidebar.) 
International travelers are 
at increased risk. As of Q2 
2008, Hoffman's company had 

discovered more than 400 
threats — including keyloggers 
that can report private keyed 
data back to a remote location — 
targeting mobile phones world- 
wide. Hoffman says one threat, 
for the Google Android OS (only 
available on the T-Mobile Gl as 
we went to press), appeared the 
day after the phone debuted. He 
recommends using security soft- 
ware (which SMobile Systems 
develops) with encryption and 
remote data backup and wipe 

capabilities, which will also 
shield your device in the case 
of theft. 

Bill Lattin, chief technology 
officer at Certicom (www.cer, sees a new type of 
encryption, ECC (Elliptic Curve 
Cryptography), as a key com- 
ponent of mobile device secu- 
rity in the near future. "Security 
must be as unobtrusive and 
undemanding on hardware 
resources as possible," says 
Lattin. "Using ECC, which is 

According to data from SMobile Systems' Threat Center, the number of mobile threats worldwide 
exploded in 2006 and is still accelerating. 

Preventive Measures 

1 f you are reading this before 

data backup and copy it to a 

users can type restore into the 

1 you leave home for your next 

portable hard drive before they 

Start menu search field and 

business trip, a few preventive 

head out. (Don't sync your 

press ENTER. 

measures will minimize your 

phone and restore data until 

Furthermore, before you 

misery on the road. When you 

you're certain it is clear of infec- 

click a link in an email or on a 

travel, carry rescue media (your 

tion.) For PC users, a System 

Web site, check the site's prop- 

security suite should let you 

Restore checkpoint is a good 

erties (mouse over the link in 

make this; it's usually an optical 

idea. To access System Restore 

an email or right-click the link 

disc but some suites support 

in WinXP, click Start and select 

on the Web page and select 

other media such as USB flash 

All Programs. Next, click Acces- 

Properties). This action is good 

drives). Also, mobile phone 

sories, select System Tools, and 

practice any time, not just 

users should perform a PC-sync 

click System Restore. Vista 

when you travel. 

PC Today / January 2009 43 

Mobile & Wireless Security 

smaller and more efficient than 
[legacy encryption algorithms], 
requires less processing power, 
reduces battery drain, and re- 
quires less bandwidth." 

Big, Bad World 

In the PC world, tricky new 
Internet threats aren't limited to 
China and the occasional un- 
lucky teenager. No longer are the 
most destructive payloads deliv- 
ered via an email attachment or 
an infected floppy diskette. "The 
Web as a threat vector is high- 
est on our radar," says Marcus. 
"Everyone is going to high- 
traffic, high- volume sites, and the 
bad guys [can] push out a lot of 
malware very quickly." Marcus 
says that Web 2.0 (interactive 
and /or social networking) sites 
are of particular concern. 

"Web 2.0 is a content-rich, 
dynamic environment that 
[lets] people upload pictures 
and other information," he 
says. "If the site has a vulnera- 
bility, bad guys can exploit that 
to upload malicious code." 
When users try to download 
desired content from a compro- 
mised site, the link on which 
they click may deliver an un- 
welcome souvenir. Exploits can 
be malware such as worms and 
viruses; spyware; code that 
turns the PC into a zombie or 
robot (bot) for attacking other 

PCs; even keyloggers, which 
can record key strokes, capture 
screenshots, and turn on micro- 
phones and cameras. Other 
means by which cyber crimi- 
nals can exploit vulnerabilities 
at trusted sites include plant- 
ing software agents that col- 
lect personal information and 
rerouting visitors to spoofed, 
malicious sites. 

Email Engineering 

Marcus, whose company's 
products include McAfee Site 
Advisor, a free utility that warns 
users before they visit a Web site 
with potentially malicious char- 
acteristics, says cyber criminals 
are becoming increasingly tal- 
ented at tricking users into 
trusting them, often employing 
old tactics with new twists. 

For example, one recent email 
threat offers a spoofed link to a 
greeting purportedly sent by 
a friend or family member 
through the Hallmark Web site. 
It contains a section for people 
concerned about security that di- 
rects users to the actual Hallmark 
site and an area where they can 
enter a confirmation number. If a 
visitor to this site enters the con- 
firmation number provided in 
the email, he receives a message 
indicating the number is unrec- 
ognizable. If the user, now dis- 
armed by the visit to the real 

Mobile phone security 
software such as 
SMobile 2007 is not 
yet a must for North 
American users, but it 
is a good precaution. 

Hallmark site, returns to the 
email and clicks the main, appar- 
ently authentic link, he will be di- 
rected instead to a file transfer 
site that delivers malware to 
his PC. "Attacks like this one 
speak to very clever social engi- 
neering," says Marcus. "Cyber 
criminals who stage such attacks 
are assuming the recipient has a 
certain level of sophistication 
and familiarity with older kinds 
of spam." 

Another hybrid email-Inter- 
net attack, which debuted the 
day after the November 2008 
election, offered links to election 
results. If you clicked the link, 
you were transported to a site 

that said you must update your 
installation of Adobe Flash 
player before proceeding. Peo- 
ple who opted for this update 
received instead the gift of a 
Trojan horse, which compro- 
mised their PCs and flooded 
them with malware. 

Take Care 

Logically, the first line of de- 
fense against Internet intruders 
is a solid security suite with an 
active subscription for auto- 
matic updates. This is a given, 
not only for anyone who ac- 
cesses the Internet, but also for 
anyone who brings outside files 
or drives within the realm of 

• iKrt '^ 1 " 




Hallmark's Web 
site has been so 
heavily spoofed by 
malware writers 
that it offers a 
warning to visitors 

* FreeScan 

McAfee's free online 
service will scan your 
system for viruses. 

If McAfee 

,> Total Protection 2009 

_^ \ 

[v.— .' I V-f <■•■■*'<■ f *s, ■,-.■ 




^^^ m 

Security suites 
such as McAfee 
Total Protection 
2009 are your 
first line of 
defense against 

44 January 2009 / 

Mobile & Wireless Security 

their PCs or networks. We're 
only dealing with Internet- 
based threats in this article, but 
here's a cautionary side note: 
Hackers are now leaving in- 
fected USB thumb drives in 
publicly accessible computers, 
including those at trade shows 
and local copy shops. Beware. 

If you're not sure whether 
your corporate or personal de- 
vices have the necessary security 
protections installed, F-Secure 
Health Check (support.f-secure 
.com / enu / home / onlineservices 
/fshc.shtml; Internet Explorer 
6 or better required) is a free on- 
line service that will scan your 
system and report your level of 
protection. (For more important 
actions that will protect you and 
your devices, see the "Additional 
Precautions" and "Preventive 
Measures" sidebars.) 

If you are running quality 
antivirus software, a rogue 
virus is improbable. It's far 
more likely that you unwit- 
tingly infected your system 
with spyware or possibly a 
rootkit (a program that spoofs 
administrative access and can 
do all sorts of nasty things). 
Trend Micro's free online scan 
scan) checks for viruses, spy- 
ware, and other threats. If you 
can't access the Internet from 
your notebook (or are hesitant 
to do so), download a program 
such as CyberDefender (www to a por- 
table drive, install it, and then 
use it to scan your PC. As long 
as you perform the scan imme- 
diately after downloading and 
installing the software, the pro- 
gram should be up-to-date. 

In the case of most free scans, 
you'll pay to purge malicious 
files, but you can use the prod- 
ucts to protect your PC after- 
ward. (CyberDefender offers a 
free, functional trial.) After all, if 
your system became infected 

while running an updated anti- 
malware program, you're due 
for a change of vendor. If you 
can't run an Internet-based scan 

or a scan produces no results 
but you believe something is 
wrong, you can call McAfee and 
access its new Virus Removal 

Service (price per incident 
varies) for assistance. 

by Jennifer Farwell 

Prudence Over Risk? 

^V urrently, devices running 

see as inevitable. In early 2008, 

data backup capability is as im- 

V^ the Symbian OS, and pos- 

according to Cleveland, Ohio, 

portant as anti-malware tools. 

sibly the iPhone or Google 

television station WKYC, the 

Although mobile viruses and 

Android OSes (which some ex- 

Kuykendall family learned just 

malware can still spread by mul- 

perts see as "up-and-coming" 

how vulnerable it could be. 

timedia messaging, Bluetooth, 

targets), carry the greatest risk 

The station reported that the 

and other remote connections, 

of infection. According to 

family's daughter unwittingly 

McAfee's David Marcus and 

SMobile's threat center, in late 

downloaded spyware that 

Hoffman agree that Internet ac- 

2008 there were 197 Symbian 

turned her phone into a 

cess (the Kuykendall's downfall) 

threats vs. five and four for 

"spy phone." SMobile's Dan 

is the Achilles' heel of mobile 

Windows Mobile and Black- 

Hoffman says this type of spy- 

phones. Problems from down- 

Berry platforms, respectively. 

ware— which can monitor 

loaded malware or unautho- 

Having Java enabled on your 

conversations, intercept email, 

rized connections range from 

device ups the ante a bit — 

and turn your phone on re- 

having your Address Book 

SMobile Systems reported 

motely—is the next big threat 

stolen (and potentially targeted 

there were 28 threats for Java- 

for mobile devices. If these 

for exploit) to having the phone 

enabled phones during the 

programs are as stealthy as 

rendered unusable. The good 

same period. 

Hoffman asserts, detection may 

news is that many mobile anti- 

However, the situation can 

be difficult until serious data 

malware programs are inexpen- 

change quickly, and prudent 

compromise has occurred. 

sive. SMobile's VirusGuard for 

users should prepare them- 

Eradication may require a wipe 

Google Android, for example, 

selves for the threats many 

of your phone, which is why 

is $4.99. 

Additional Precauti 


11 ulnerability intelligence 

graphics, and video files. It also 

programs— including Win- 

V provider Secunia reports 

navigated to 156 malicious 

dows—even the best 

that in addition to keeping 

Web pages. According to the 

security suite may not save 

your security suite updated, 

report, Symantec's Norton 

your system. 

you should frequently patch 

Internet Security suite (www 

F-Secure Health Check 

other Internet-connected pro- caught 30.95% 


grams. If that sounds like un- 

of the exploits. No other secu- 


necessary effort, consider this. 

rity suites identified more 

.shtml), mentioned in the main 

In October 2008, Secunia 

than 4% (BitDefender [www 

article, can scan your PC for 

tested 12 well-known security], McAfee 

missing software updates and 

suites for their ability to iden- 

[], and Trend 

other potential problems, as 

tify and catch 300 lab-devel- 

Micro [] all 

can Secunia Software Inspector 

oped exploits. The test 

tied at 3.97%). We're not sug- 


machines were all running 

gesting that Norton is the only 

scanning/online; compatible 

Windows XP missing certain 

worthy security suite. There are 

with Internet Explorer and 

patches with a variety of vul- 

many reasons why one of the 

Firefox, among other browsers). 

nerable programs installed. 

other suites might suit you 

We recommend running both 

On the test systems, Secunia 

better, and a rating of 31 % isn't 

because each has its own 

unzipped and opened 144 ma- 

particularly impressive. The 

strengths. If the scans reveal 

licious but innocuous-seeming 

point is that unless you faith- 

vulnerabilities, either scanner 

file types including Office, 

fully patch vulnerable 

will help you eradicate them. 


Staying up-to-date with the latest soft- 
ware and service updates for your 
phone can be tedious and time-con- 
suming. We're here to help with information 
about the latest features and enhancements 
that apply to your mobile phone and carrier. 

Samsung Posts Windows Mobile 6.1 
Upgrade For Sprint ACE 

Sprint ACE users received an update to WM6.1. You get 
the standard functions with the up- 
grade, including the ability to view 
and edit Excel and Word files, 
chat-style text messaging, Live 
Search, and more. The update also 
gives you the ability to install un- 
signed apps and adds support 
for turn-by-turn navigation via 
Sprint Navigation. To upgrade 
your phone, you need a compatible 
Windows PC, USB cable, Active- 
Sync or Windows Mobile Device 
Center, and a fully charged ACE 
handset. You'll want to back up 
your handset before installing the 
upgrade. Samsung also recom- 
mends removing any microSD and 
SIM (subscriber identity module) 
cards prior to upgrading. 


■ Sprint Nextel Launches 
WebCapTel On The Go 

This new, free mobile Web-based ser- 
vice makes it possible for hard-of-hearing 
customers to read word-for-word captions 
on Windows Mobile 6 Web browsers. Sprint 
WebCapTel On The Go is compatible with 
many popular phones, such as the HTC 
Diamond, HTC Mogul, Palm Treo 800w, 
and the Motorola MOTO Q9c. Registered 
users require the use of two phones: one 
for conversing with a caller and one for 
viewing captions. Before making a call, 
a WebCapTel On The Go user must visit on one mobile 
phone and log in to be able to read text 
captions. This service is available to Sprint 
customers in the U.S. and within U.S. ter- 
ritories who use a WM6 phone or one 
with the Apple Safari Web browser. 
WebCapTel On The Go is an extension of 
Sprint's existing WebCapTel service, which 
also provides captions during calls but 

46 January 2009 / 


requires a computer and Internet browser to 
display the captions. 

■ Sprint-Clearwire Complete 

The Sprint-Clearwire Merger became offi- 
cial Dec. 1, 2008. The two companies are 
working on a plan to offer the WiMAX 
(Worldwide Interoperability for Microwave 
Access) network they and a group of other 
partners have been promising. The plan will 
provide broadband wireless to 140 million 
people within 30 months of the merger ap- 
proval. The Justice Department reviewed the 
deal last summer, and the FCC approved the 
final requirement before the buyout could 
take place. 

■ DOJ & FCC OK Verizon 
Wireless' Alltel Purchase 

Just a week after the Department of 
Justice approved Verizon Wireless' pro- 
posed $28 billion purchase of Alltel, the 
FCC voted unanimously to approve the ac- 
quisition, as well. The buyout will create 
the largest CDMA (Code-Division Multiple 
Access) network in the U.S. and will make 
Verizon Wireless the largest carrier in the 
U.S., pushing it ahead of AT&T, which uses 
the GSM (Global System for Mobile Com- 
munications) standard. The DOJ and the 
FCC attached conditions to the deal, in- 
cluding a requirement that Verizon Wire- 
less honor Alltel's existing roaming 
agreements for four years. In addition, 

Verizon Wireless must sell assets in 22 
states to avoid having duplicate wireless li- 
censes in those markets. 

You can access the update from your 
desktop computer or download a CAB file to 
install directly on your mobile device. The 

■ Microsoft Patches 

In most cases software 
updates for a mobile phone 
come from the phone's man- 
ufacturer or our wireless 
carriers. However, Microsoft 
released a patch for WM6.1 
phones that repairs a se- 
rious email bug. This simple 
fix addresses a problem that 
prevents users from sending 
messages if the default out- 
bound email server is inac- 
cessible. You see, WM6.1 
introduced a feature that al- 
lowed mobile operators to 
set up a default alternative 

SMTP (Simple Mail Transfer \ 

Protocol) server that users 
could send email through. If the feature 
is not set up on your device and your own 
server becomes inaccessible, your email 
program won't send your message. Worse 
yet, your email account configuration could 
become corrupted in the process. Microsoft 
released the patch to fix the problem and 
ensures WM6.1 acts appropriately when 
it detects a blank value for the alternate 
SMTP server. 

■ G1 Fixes 

The T-Mobile Gl running the brand-new Android operating system has 
received a few OTA (over-the-air) patches in recent months. Some of the 
early updates included bug fixes for Wi-Fi connectivity and email. The RC28 
email was barely released before Google replaced it with the RC29 update, 
which fixed a security vulnerability discovered in the browser that could 
allow keystroke capture when users visited malicious sites. Users who re- 
ceived the RC28 update also received the RC29 update, while some users 
skipped directly to RC29. 

Not long after Google released the RC29 update, it received word of a 
jailbreaking issue with Android that allowed a hacker to gain root access to 
a phone. This jailbreak would give full admin abilities to the phone, giving 
way to good or bad modifications. After weighing the options, Google de- 
cided the potential for bad modifications outweighed the potential for good 
and decided to block root access by means of the RC30 update. Considering 
that root access generally lets you do things that you shouldn't without 
safety warnings, Google likely made the right decision in this case. 

■ Unlocked Treo Pro Gets Bluetooth Fix 

Palm posted an update for the 
unlocked Treo Pro smartphone 
that fixes a call routing issue 
that occurs when using a 
Bluetooth car kit or Bluetooth 
headset. Treo Pro users re- 
port losing audio on an active 
call when receiving a second 
call they chose to let ring 
or ignore. The update, which 
is available from Palm's 
Support page, eliminates 
the issue. Alternately, you 
can get the update OTA 

download is available from Microsoft's Down- 
loads page ( 

■ Centro Receives ROM Update 

Palm and Verizon Wireless recently is- 
sued a ROM update for the Verizon Wire- 
less version of the Palm Centro. As we went 
to press, Palm provided little information 
regarding the 1.03 update, simply saying, 
"This software update is a minor 
tune-up that may improve de- 
>v vice usability in certain sit- 
uations." To see whether your 
phone needs the update, press 
the Phone button, and then 
press Menu. From the Op- 
tions menu, select Phone Info. 
If your software's version 
number is lower than 1.03, 
and the end of the string says 
VZW, you should install this 
update. Palm's Support page 
makes HotSync & SD card- 
based versions of the up- 
date file available. As always, 
you should back up your 
phone before installing any 
ROM updates. 

by Jennifer Johnson 

PC Today / January 2009 47 


■ Clean Your Memory 

If your BlackBerry is performing sluggishly, try 
cleaning out the Address Book Cache, Certificate 
Search, Certificate Status Manager, Clipboard, Content 
Protection Cache, Encrypted Messages, Key Store, and 
PGP Key Search locations. To activate these memory 
cleaner options, you need to enable password protec- 
tion. Select Settings from the Home screen; choose 
Options, Security Options, and General Settings; and 
then select Enable for Password and Content Protec- 
tion. Press the Escape key, select Save, and then enter 
and confirm a password. Press the Escape key again to 
back out to the Security Options menu and then select 
Memory Cleaner. From this menu, you can enable your 
BlackBerry to automatically clean the memory when 
holstered or idle. You can also put a Memory Cleaner 
icon on the Home screen. Scroll to view the Registered 
Cleaners. Select any cleaner, press the Menu key, and 
select Clean Now to clean all memory locations or just 
clean the individual memory location. When finished, 
press the Escape key to return to the Home screen. 

General Settings 

Password: Enablec 

Number of Password Attempts: 1C 

Security Timeout: 2 Min 

Prompt or >n Install: Nc 

Lock Hand! ::nng: Nc 

Allow Outgoing .ocked: 

Content Compression: 
Content Protection: 


. ■•.;: 

Enable Password 
and Content 
Protection to 
access the Memory 
Cleaner utility. 

■ Delete Old Messages 

To limit the number of old messages your 
BlackBerry holds on to, scroll to and launch 
the Messages utility; press the Menu key, se- 
lect Options, and choose General Options; 
and then select the Keep Messages setting, 
press the trackball, and move the setting from 
the default of 30 Days to the 15 Days option. 
Press the Escape key, save the changes, and 
then press the Escape key until you return to 
the Home screen. 

■ Delete Old Calendar 

To cut down on the number of expired 
Appointments your BlackBerry saves, simply 
open the Calendar utility and press the Menu 
key. Next, select Options, select the Keep 
Appointments setting, press the trackball, and 
then select the 15 Days option to change the 
setting from the default 60-day option. Note 
that this doesn't affect recurring appoint- 
ments. Press the Escape key, save the changes, 


and press the Escape key again until you're 
back at the Home screen. 

■ Remove Unused Applications 

To free up additional space, remove any 
applications you no longer use. Select Set- 
tings on the Home screen; choose Options, 
Advanced Options, and Applications; and 
then highlight the application you want to 
uninstall. Press the Menu key and select 
Delete to remove the app from your Black- 
Berry. When you're done, press the Escape 
key to return to the Home screen. 

■ Clear Out Your Address Book 

If your BlackBerry is connected to your cor- 
porate network via BlackBerry Enterprise 
Server, Microsoft Exchange version 3.5 or later, 
or BlackBerry Enterprise Server 2.2 or later for 
IBM Lotus Domino, you can look 
up important company contacts f 
when needed rather than store 
them locally on your phone. If 
this works for you, launch the 
Address Book from the Home 
screen, select the address you 
want to delete, press the Menu 
key, and then select Delete. Re- 
peat this for each unwanted 
Address Book entry. After you 
delete all unnecessary Address 
Book entries, press the Escape 
key to return to the Home screen. 

deleting pictures, press the Escape key to re- 
turn to the Home screen. 

■ Delete BlackBerry Sample Video 

BlackBerry comes with a video clip that 
takes up valuable memory space. To remove 
the video, select Settings from the Home 
screen and choose Options, Advanced Op- 
tions, and Applications. Select BlackBerry 
Sample Video, press the Menu key, and then 
select Delete. Press the Escape key to return 
to the Home screen. 

■ Delete Unnecessary Languages 

Having a multilingual BlackBerry is all fine 
and good, but many of us only need it to speak 
our native tongue. To delete support for extra 
languages, select Settings from the Home 
screen; choose Options, Advanced Options, 

■ Clear Browser Cache 

To clear out extra- 
neous data packed 
in your BlackBerry's 
browser cache, launch 
the Browser applica- 
tion, press the Menu 
key, select Options, 
and then select Cache 
Operations. From this 
menu you can clear 
the History, Content 

Cache Operations 

:/:: . . ■ ■:: 

Pushed Content 

■ ::cv ': V. .'. :■ 

■■:■ : 

Clearing browser cache 
can free up extra space 
on your BlackBerry. 

■ Enable Content 

To turn on Content Com- 
pression, select Settings from 
the Home screen and choose 
Options, Security Options, and General Set- 
tings. Next, highlight the Content Compres- 
sion setting, press the trackball, and select 
Enable. Press the Escape key, save your 
changes, and then press the Escape key again 
to return to the Home screen. 

■ Delete Images 

Anyone who has a camera-enabled Black- 
Berry knows that pictures can quickly fill up 
a memory card. To delete unwanted photos, 
select Media from the Home screen and scroll 
to Pictures. Next, press the trackball, high- 
light and select Preloaded Pictures, and scroll 
to an image you want to delete. Press the 
Menu key and select Delete. When you finish 

Cache, Pushed Content, and Cookie Cache using indi- 
vidual Clear buttons. You'll know all your content is 
cleared when you have no additional buttons to select. 
Press the Escape key to return to the Home screen. 

and Applications; and then select an unwanted 
language that appears on this screen. Press the 
Menu key and select Delete to proceed. Do this 
for any unused language you see here. Press 
the Escape key to return to the Home screen. 

■ Clear Call Logs 

To delete call logs, scroll to and launch the 
Messages utility from the Home screen, press 
the Menu key, select View Folder, and choose 
Phone Call Logs. Next, select a date, press the 
Menu key, and select Delete Prior, and then 
select the Delete button to get rid of all call 
logs on and before the selected date. Press the 
Escape key to return to the Home screen. 

by Andrew Leibman 

Get Help 

& Find Answers 

~ BlackBerry Answers 

If you're at a loss for how to do 
something with your BlackBerry, 
try BlackBerry Answers. As long 
as you have Internet access, you 
can launch the Browser app. 
Press the Menu key, select Go 
To, type, and then press the 
trackball to navigate to the site. 
At the top of the page, you'll 
find the BlackBerry Answers 
field. Simply enter a question 
about your BlackBerry and get 
an instant answer culled from 
Research In Motion's extensive 
knowledgebase. You can use 
this handy utility to get infor- 
mation about how to set up 
email, what attachment file 
types the BlackBerry will open, 
how to use GPS, how to estab- 
lish a Bluetooth connection, 
and more. 

1 Live Search 
For BlackBerry Beta 

Once upon a time, Live Search 
was just for Windows Mobile 
smartphones, but now the mo- 
bile-optimized search, maps, 
and directions tool plays nicely 
with your BlackBerry. If you 
have Internet access, launch 
the Browser app, press the 
Menu key, select Go To, type, and then 
press the trackball to navigate 
to the site. Scroll down and 
press the trackball on the 
Download link for the version 
that best suits your BlackBerry 
OS version. Press the trackball 
again to download Live Search 
for BlackBerry Beta. When the 
download is complete, select 
OK, back out to the main menu, 
open the Applications folder, 
and then select Live Search. 
Accept the terms of use and get 
ready to never get lost again. 


any of us use a work laptop, a 
home computer, and a mobile 
phone every day. In doing so, it's 
very easy to scatter information and forget 
what files we have on which devices. Maybe 
one important file resides on your laptop, 
and you save another to your desktop PC, 
while you have other information stored on 
your mobile phone. Inevitably, you may not 
have access to a file when you need it most. 

Simply put, we need a way to bring all of 
these aspects and files in our lives together. 
Microsoft has come up with a program that 
lets you sync your data, devices, and appli- 
cations. With its Live Mesh service, Microsoft 
envisions devices working together, giving 
you the ability to access your data and appli- 
cations from anywhere while also providing 
easy access to the people with which you 
want to connect. This new service is currently 
in beta, meaning Microsoft still has some bugs 
and features to work out, but the program is 
still worth a look if you need a way to syn- 
chronize and simplify your data. 

■ Meet Live Mesh 

Live Mesh consists of four components: a 
platform, a cloud service, software, and a plat- 
form experience. The platform defines digital 
relationships among devices, data, applications, 
and people. The cloud (or Internet-based) ser- 
vice provides an implementation of the plat- 
form hosted in Microsoft data centers. Software 
enables local applications to run offline and in- 
teract with the cloud. Microsoft uses the term 
"platform experience" to describe the benefits 
of the platform, such as the concept of bringing 
your devices together. Combined, these compo- 
nents aim to deliver a seamless experience that 
connects you to the people you care about and 
puts your information, applications, and de- 
vices at your fingertips. 

Live Mesh isn't limited to a single person: 
You can share and sync photos, documents, 
and other files with other users through Live 
Mesh simply by sending them an invitation 
to share a folder. Whenever another user 
changes or uploads a shared Live Mesh file, 
the Notifier area displays an update, advising 
you as to who made the change and when. 

■ Try For Yourself 

Among its features, the open beta for Live 
Mesh includes limited use of the new Mac 
and Windows Mobile 6 clients. Live Mesh 


f\^J " |<& https//«™ 

currently is a free service, and it will likely 
continue as such to some degree. It's possible 
that Microsoft could split this service into paid 
and free versions, though Microsoft hadn't 
made any announcements regarding this as of 
press time. Given that Live Mesh is in beta at 
this time, we expect to see more features re- 
leased in coming months. 

To use Live Mesh, you need 
a broadband-connected com- 
puter and a Windows Live ID. 
Before you can add a device 
to your mesh, however, you 
need to download and install 
the Live Mesh software. After 
you sign up for Live Mesh 
from your computer, you can 
access your Live Desktop on 
your mobile phone's display by 
pointing your mobile browser 
to and signing in 
with your Live ID. (You also 
need high-speed data access 
on your phone to take advan- 
tage of Live Mesh's smart- 
phone capabilities.) 

■ Hands On 

We installed Live Mesh on two PCs (a 
laptop running Windows XP and a desktop 
running Windows Vista) to test the service. We 
also accessed Live Mesh from a smartphone 
running Windows Mobile 6.1. The service op- 
erated smoothly and was easy to use. We were 
able to upload files on our laptop and view 
them on our desktop computer and mobile de- 
vice. We also uploaded photos from our smart- 
phone to our Live Mesh account, which was 
nice for backing up our phone's photos. 

There is also a Live Mesh client for Win- 
dows Mobile 6 smartphones, which you can 
find by signing in to your Live Mesh ac- 
count on a PC and navigating to your 
Devices ring. From the Add Device link, lo- 
cate and click the Use Live Mesh For Mobile 
Devices. This client is in an early, prebeta 

=— r A'eb Device; 


Qf ' El " § * ' P B»9« - Tool: 

1 i'flffifiiTMi 

^^^' " , 






. m Laptop PC 

^ Brian Perry added 

111 I demo 

I^J 1 member(s) are active 

in folder demc 

*g, Brian Perry added 
in folder demc 

flKf Live Desktop 
9m Online 

h 1 Mobile Pictures 

\{j..\ 1 member(s) are active 

H Blackjack EI 


^ Online 

P Brian Perry update 
PIC-0O10.jpg, PIC- 
PIC -00O8.jpg in fo 

h | Hello Alumni 

l{[ | 1 member(s) are active 

h 1 Interesting Pictures 
l^pj* 1 member(s) are active 

^ Brian Perry deletec 

hi MyPictures 

IQU 1 member( 5 ) are active 

ij Brian Perry added 

View all news 



Manage devices 

a * i 

[_=] .*- 


Get a quick look at what is happening using the News, 
Folders, and Devices views. 

The Live Mesh Devices ring provides an easy look at which devices are 
currently connected to your account and makes it easy to add devices. 

stage, but Microsoft encourages users to 
check it out and provide feedback. 

■ Alternatives 

We've talked a lot about Live Mesh be- 
cause it is a new and exciting service. If 
you're looking for something that has been 
around for a while, consider the following 
clients to help you sync your life: 

Google Docs Beta. You can use Google 
Docs Beta (free; to view 
mobile-optimized versions of your docu- 
ments and spreadsheets on your Windows 
Mobile smartphone. (You 
need to upload the files 
from your PC first.) 

Mark/Space Missing 
Sync. Like PocketMac, Miss- 
ing Sync ($39.95; www.mark synchronizes 
your contacts, iTunes, cal- 
endar, and other important 
files between your Windows 
Mobile smartphone and Mac. 
You can also sync call history 
and text messages from your 
smartphone with your Mac, 
so you can easily track your 
time. Missing Sync supports 

synchronization via Bluetooth, so you won't 
have to mess with cables. 

Memeo AutoSync. A more full-featured 
synchronization program, Memeo AutoSync 
($29.95; lets you sync files 
between multiple computers, USB devices, 
portable hard drives, and your iPod, among 
other devices. You can even 
create special sync plans for 
work documents, photos, and 
your music. 

Microsoft ActiveSync 4.5. 
Of course, we can't talk about 
synchronization applications 
without mentioning the ob- 
vious — ActiveSync 4.5 (free; and the 
Windows Mobile Device Cen- 
ter. ActiveSync 4.5 comes 
with many Windows Mobile 
smartphones, but if you've 
lost your installation CD, you 
can download the file from 
dowsmobile/ en-us /help 
/synchronize /active sync 

For Vista users, Windows Mobile Device 
Center replaces ActiveSync, but it accom- 
plishes the same tasks of syncing your 
PIM (personal information manager) data, 
such as your address book, calendar, and 
to-do list, with Outlook on your computer. 
Many people use ActiveSync or Windows 
Mobile Device Center and no other applica- 
tions. That's fine, but software such as Live 
Mesh can offer greater functionality for mo- 
bile users on the go and for users who want 
to share files with other people. 

PocketMac for Windows Mobile 5 & 6. 
Just because you have a Windows Mobile 
smartphone and a Mac computer doesn't 
mean you don't want to sync files between 
each device. Although this functionality is 
not generally available straight from the 
box, you can synchronize your Contacts, 
Calendar, Tasks, and Word and Excel docu- 
ments that reside on your Windows Mobile 
smartphone with Macintosh software such 
as Microsoft Entourage, iCal Calendar 
and Tasks, Daylite, and more. PocketMac for 
Windows Mobile 5 & 6 ($29.95; www.pock even has the ability to sync your 
iTunes media files. 

PC Today / January 2009 51 


■ T-Mobile'sd 
comes preloaded 
with a number of 
applications and 

: © 

« ■. 



Will Android 

Push IT'S Buttons? 

A Closer Look At This New OS 


It's not every day we see a new mobile 
phone operating system that has the po- 
tential to change the industry. In October 
2008, T-Mobile released the Gl ($179.99 with a 
two-year contract, after discounts; www, the first smartphone to run the 
Android platform. Developed by The Open 
Handset Alliance, a group that includes 
Google and more than 30 other technology 
and mobile companies, Android is a free, 
open platform for mobile phones. Let's take a 
closer look at both the platform and the phone 
and how each meets traditional business 
smartphone needs. 

■ The Platform 

Upon release, Apple's iPhone 
was primarily a consumer-focused 
device. Now, thanks to Exchange 
server support and other features, 
the iPhone is much more business- 
friendly. It appears that the Android 
platform may be following a similar 
path, especially given that T-Mobile 
as a company is mostly consumer- 
focused. According to a T-Mobile 
spokesperson, the Gl is primarily 
for "consumers who are looking for 
new innovations on their mobile 
phone and who want a rich, intu- 
itive mobile Web experience with- 
out compromising the phone and 
communications features they use 
every day." 

Even so, the Android platform 
(and the Gl in particular) isn't com- 
pletely cold to the idea of business 
use. Because Android is an open- 
source platform, third-party devel- 
opers are able to create software for 
the Gl and other upcoming Android phones 
to extend the capabilities of the OS. In fact, 
since Android's release, developers have 
done just that. Even though the OS doesn't 
support Exchange out of the box, companies 
such as CompanionLink Software (www have created applica- 
tions that enable that type of functionality. 
With CompanionLink for Google Android, 
for example, you can synchronize data from 
your desktop software (such as Microsoft 
Outlook) with your Google Android phone. 
CompanionLink for Google Android runs on 
your PC and synchronizes with your Google 
account. Because you can easily link the Gl 

and other Android phones to a Google ac- 
count, the information from your computer 
syncs with your phone using Com- 
panionLink's software. With this two-way 
sync, all of your contacts, calendar, and tasks 
remain consistent between your desktop 
software and your phone. 

■ The Hardware 

In terms of hardware, the T-Mobile Gl has 
just about everything you'd expect from a 
business smartphone, including Bluetooth 
and Wi-Fi. Its size — it measures 4.6 x 2.2 x 0.6 

This keyboard provides the only way for 
users to tap out emails since the phone 
doesn't come with an on-screen keyboard. 
(It's likely that someone will develop software 
that provides an on-screen keyboard at some 
point, though, to help the device mimic its 
competitor, the iPhone.) The Android OS is 
easy to use with finger controls. Web 
browsing using the trackball and full-featured 
Web browser works well, too. 

Speaking of add-on software, the Android 
Market ( pro- 
vides easy access to download and install 

Get directions 
from Google 
Maps with the 
G1's built-in 
GPS receiver. 

inches (HxWxD) and weighs 5.6 ounces — is 
in line with other smartphones, as well. The 
included 1150mAh Li-Ion battery provides 
up to five hours of talk time and up to five 
days of standby time. 

In addition to the typical cables, power 
adapter, and case, the Gl retail box includes a 
1GB SD card. An SD slot is located on the 
phone's side to the left of the Call button. 
You'll need to slide the display horizontally 
to open the SD slot's cover. 

The phone has a 3MP camera that takes 
decent pictures. An arc-shaped sliding hinge 
moves the display to reveal a full QWERTY 
keyboard with a complete row of numbers. 

applications on the T-Mobile Gl, similar to 
the way Apple's App Store does for the 
iPhone. At press time, all of the applications 
on the Android Market were free, though 
support for paid application functionality 
was in the works. 

■ Business Potential 

Although Android may not be completely 
business-friendly right out of the box, it has a 
lot of potential. The Gl itself is primarily con- 
sumer-focused, but with help from add-on 
software such as that from CompanionLink, 
it could also be a business-worthy phone for 
some users. by Jennifer Johnson 

PC Today / January 2009 53 


■ Using SMS 

or WAP, you 

can make 


from your 

mobile device. 


«fc t4& 

* S> 


obile Payments Work 

With the advent of mobile payment 
options, individuals and compa- 
nies can save untold amounts of 
time, leading to greater convenience, in- 
creased efficiency, and (for businesses) even 
increased profits. Time, after all, is money. 

There are three primary options for making 
mobile payments: SMS (Short Message 
Service), WAP (Wireless Application Protocol), 
and NFC (Near Field Communication). The 
technology is compelling, and an overview of 
how these payment options work is in order. 

■ SMS 

You can make payments with your mobile 
phone using SMS, although you'll likely 
have to pay for the privilege for each trans- 
action. Primarily used for purchasing digital 
goods, you can use a shortcode (a five- or 
six-digit number) to request an order and 
send the number as a text message. A 
charge or a product can then be sent back to 
your phone. 

Primarily, companies use shortcodes for 
marketing campaigns and advertisements. 

For example, you're likely to see a TV com- 
mercial for a product or business encour- 
aging you to text 55555 (or whatever 
shortcode they use) to receive a free coupon 
or digital download. 

Think of shortcodes as mobile URLs; they 
can give users access to products and content 
via a wireless carrier's network. Conversely, 
companies have access to more customers — 
the hundreds of millions of wireless sub- 
scribers who may or may not use the Internet 
for such things. 

54 January 2009 / 


One major drawback to con- 
ducting transactions via SMS is 
that nothing is guaranteed. Text 
messages sometimes get lost in 
the ether of a wireless network, 
and the same is true of transac- 
tional items. Your text may not 
reach its destination, or perhaps 
you'll never receive the content 
you paid for. 

SMS is not designed for POS 
(point-of-sale) transactions. It's 
too slow and clunky, and there 
are other, better means of making such pur- 
chases. SMS is convenient on the go, how- 
ever, because you can make transactions 
anywhere you get cellular service. 

■ WAP 

To put it simply, WAP is a technology that 
formats Web pages to fit the screen and low 
processing power of a mobile device such as 
a smartphone. You can access the Internet 
from your mobile phone with WAP, to be 
sure, but the protocol offers more: WAP 
billing is a powerful and convenient way to 
make mobile payments. 

To use WAP technology to pay for an 
item, you sign up for an account with an on- 
line bill payment service. Then, when you 
make a purchase using your mobile phone, 
you use the account you created to transfer 
the money from your account to a retailer. 
You can also use bill pay services to transfer 
funds, which is handy in some POS situa- 
tions or if you have a college-aged child 
who needs some quick cash. 

WAP-based payments are cost-effective 
because they circumvent the charges that 

My eBay 

£j Last update: 1 mins. ago 

^ NEW PetzlTikka Plus 
W HeadLamp4LEDLightE47P 
V 8.50 USD 

/a NEW PetzlTikka Plus 

* HeadLamp4LEDLightE47P 

_i. ft ^n i i c n 

WAP brings the 
Internet to mobile 

Using NFC technology, you can make POS 
payments just by waving your mobile phone 
near a payment terminal. 

credit card companies levy on re- 
tailers. (Transactions may still 
incur a charge from the bill pay 
service provider, but not on the 
same level as credit card compa- 
nies.) Mobile transaction ac- 
counts are available from many 
online services, including mBlox, 
Obopay, and Upaid, as well as 
from more familiar companies 
such as eBay, Google, and 
PayPal. Your funds are protected 
by a PIN, and you can add 

money to your account as you would with 

prepaid cellular minutes. 

■ NFC 

Unlike SMS and WAP, NFC is a hard- 
ware-based, short-range wireless technology 
requiring a chip in one device to communi- 
cate with a chip in another NFC-capable de- 
vice. In some cases, both 
devices will be active, 
meaning that both can 
read and write data; 
other scenarios feature a 
passive NFC "tag" that 
contains data acquired 
by an NFC reader at the 
point of a transaction. 
The transmission range 
is, by design, incredibly 
short — just a few cen- 
timeters. This effectively 
provides security because interception of the 
signal at such a short distance is extremely 
difficult. Still, encryption and security 
methods are in development to ensure that 
NFC transactions are more secure. 

Like its more common wireless cousins, 
Wi-Fi and Bluetooth, NFC technology is sur- 
prisingly simple. Built on existing technology 
(including RFID [radio frequency identifica- 
tion]) and infrastructure (including smartcards 
and readers), NFC may actually replace them 
and other contactless transaction methods. 
NFC chips require very little power (which 
means your smartphone's battery will hardly 
be affected by it), and NFC-enabled devices 
can transfer data at a rate as fast as 424Kbps 
and are compatible with other wireless stan- 
dards — Bluetooth and Wi-Fi included. 

NFC's greatest strength is arguably its in- 
credible ease of use. Most transactions consist 
of someone briefly waving an NFC-enabled 

mobile device in front of another NFC device, 
such as a ticket kiosk. Data, such as the pur- 
chase amount, travels between the two de- 
vices and is processed immediately. The 
transaction can be conducted in a few sec- 
onds, making it faster (and more convenient) 
than even the swipe of a credit card. 

In order for a device to have this capa- 
bility, it needs a special chip. However, ABI 
Research estimates that by 2011, as many as 
450 million mobile phones will have the nec- 
essary NFC chip inside. By then, we all may 
be using our mobile phones to do everything 
from paying a cab fare to transmitting health 
records in the emergency room. 

The infrastructure needed to support NFC 
transactions has already been strategically (if 
sparingly) implemented all over the world, 
from fast food restaurants and coffee shops to 
the London Underground. Granted, com- 
pleting this infrastructure is a long way off, 
but before you know it, impatient baristas 
with polite but terse 
smiles will be encour- 
aging you to please put 
away your credit card 
and just swipe your 
phone by the payment 

To use mobile payments with WAP, 
you first need to get a mobile payment 
account from an online payment 
service such as Obopay. 

■ Major Players 

Internationally, the 
UK has been earnest in 
rolling out infrastruc- 
ture for NFC payment possibilities, as have 
Japan and South Korea. In Japan, NFC tech- 
nology is blossoming, finding a foothold in 
vending machines (which are a source of 
even high-end products in Japan), transporta- 
tion, and personal data transmission. 

In the U.S., Citi, MasterCard, Visa, and 
other entities are hard at work partnering 
with others to develop devices and infra- 
structure to bring mobile payment and POS 
technology to fruition. McDonald's, WalMart, 
and the New York City subway system have 
already conducted NFC experiments. Mobile 
payments via SMS and WAP have found 
moderate success in the U.S., although the 
sheer number of service providers and other 
major financial institutions has complicated 
matters and slowed development. Within a 
few years, however, expect to be using all 
three of these technologies on a regular basis. 
by Seth Colaner 

PC Today / January 2009 55 


all about 


The Strange & Possible Future 

■ What if you 
could charge that 
mobile phone 
you're carrying- 
just by moving? 


56 January 2009 / www.KotKcoiti 


Our society is getting more mobile all 
the time. In the not-too-distant past, 
asking someone whether or not they 
had a cell phone was a legitimate question. 
Today, it's more appropriate to ask what 
kind of mobile phone someone has. The mo- 
bile craze extends to portable digital mu- 
sic players, personal DVD players, and all 
manner of pocket gaming devices, as well. 
And, on perhaps a more practical level, mo- 
bile computing — whether on smartphones, 
PDAs, or notebooks — is no longer optional, 
especially for business travelers. 

Yet despite the myriad of tools for mobile 
communication and productivity at our fin- 
gertips, one glaring deficiency remains: how 
to power all those devices. Though it's a joy 
to have a bright, gorgeous touchscreen smart- 
phone or smoking fast flyweight notebook, 
it's not as enchanting if the batteries only last 
a few hours. This is the constant headache we 
all endure — that the innovations in mobility 
have far outpaced the technology required to 
power devices effectively. 

Yes, Li-Ion and NiMH batteries were a 
fine improvement over previous power op- 
tions, but they can only go so far and get so 
small. People demand longer-lasting solu- 
tions. (Oh, and if those solutions could also 
be green, that would be superb.) It's a tall 
order and, somehow, spending money adver- 
tising that a device has a battery that lasts 
three times longer than the competition just 
isn't as sexy as being able to say that the de- 
vice is three times faster. Still, there are plenty 
of emerging technologies that may offer a so- 
lution to the mobile power crunch. 

■ Solar Power 

What better source of power is there than 
the sun? It's free, abundant, and leaves no 
impact on the environment. Furthermore, it's 
not nation-specific; that is, you never have to 
worry about whether or not your charger is 
compatible with outlets in, say, Dubai. It's 
the same sun over everyone. And the best 
part is that you don't even need an outlet to 
power a solar device — it will work just as 
well (if not better) in the middle of the Sahara 
as it would in Manhattan. 

Solar power is appealing in theory, but 
current solar panels just don't save enough 
juice to effectively power a laptop. Still, solar 
devices can charge the average cell phone in 
about an hour, providing enough juice for a 


Products like the Solio Magnesium Edition 
($169.95; absorb and store 
solar energy in a portable charger to power 
mobile devices. 

lengthy conversation, and they're small and 
portable enough to go just about anywhere. 

One innovative step forward is that some 
devices have integrated solar panels, 
meaning that they can charge themselves 
after a certain amount of solar exposure. 
However, the size of the panels remains an 
issue, as well as the fact that most mobile de- 
vices remain hidden from the sun in pockets 
and purses the bulk of the time. 

■ Generating Your Own Power 

Kinetic energy is created by movement. 
Kinetic watches, which maintain a charge by 
converting the wearer's movements into 
power, have been around for years. Of course, 
generating enough energy to keep a watch 
running is nothing like generating the power 
needed to keep a mobile phone (or especially a 
laptop) going, but developers are trying. 

For example, the company Mad4Mo- 
bilePhones has patented a technology that 
would let you charge and power your mobile 
phone just by moving it around. A tiny gen- 
erator (about 1 cubic centimeter in size), de- 
veloped by engineers at the University of 
Southampton, is purportedly 10 times more 
powerful than similar devices. The generator 
works by absorbing the energy around it — 
which could include your heartbeat if you're 
holding it in your hand. 

■ WiTricity 

The idea of wireless electricity has been 
around since the discovery of electricity be- 
cause, in fact, electricity has always been wire- 
less. Wires simply offer a means of conducting 
electricity in a way that ensures that the 
proper voltage reaches its destination with a 
minimal amount of impedance. They're insu- 
lated with rubber or plastic to both protect the 

wires from becoming nicked or damaged and 
prevent people from getting zapped. Now, re- 
searchers are trying to unwire us once again. 

The appeal of this technology, dubbed 
WiTricity, is partially that it's so simple. A 
charging device resonates at a certain fre- 
quency, thereby emanating electromagnetic 
energy. Any simple electronic device can pick 
up this energy. For example, MIT researchers 
used it to make a 60-watt light bulb glow. 

Generating electromagnetic energy is easy 
enough; the problem up to this point has been 
efficiency. The nature of this energy is that it 
emanates in all directions, meaning that if 
you want to power a light bulb, you would 
need to generate much more energy to 
light it than if you connected it directly to a 
power source with wires. However, re- 
searchers have discovered that specially tuned 
waves make it much more efficient to transfer 
energy from the source to the device. 

The application of WiTricity — what 
you would buy in a store — will be a de- 
vice resembling a plate or cradle on 
which you place your electronic de- 
vices. They'll charge up while they're 
sitting there, with no wires or adap- 
ters. And the most promising dis- 
covery with WiTricity? It doesn't seem 
to be at all affected by line-of-sight blockage. 

■ Others? 

There are many more technologies being 
explored or developed that people hope will 
be the solution to our mobile power prob- 
lems, but the above represent some of the 
most interesting and promising. 

WiTricity, a method of using induction to 
create power, has already been used by 
researchers to power a 60-watt light bulb. 

Eel Power 

If every weird idea dreamed up by 
an innovative mind was treated as 
little more than a humorous notion, 
nothing meaningful would ever have 
been invented. In that spirit, there 
are a couple of other alternative 
power solutions currently under de- 
velopment. Who knows? Maybe one 
of these could be that silver bullet 
we've been waiting for. 

You may think that the electric 
eel is a myth, but, in fact, the species 
does exist. As a matter of fact, they 
actually are electric — it's not a mis- 
nomer. When predators attempt to 
attack the eels, they emit a surpris- 
ingly high voltage to fight back. 
Scientists are working to find ways 
to mimic how the electric eel gener- 
ates its electricity. This type of 
power, though it sounds perhaps 
farfetched, may be closer to imple- 
mentation than you might think. 

Others include fuel cell technology, which 
increasingly seems to be slipping from favor 
due to its slow development. Hydrogen power 
would be an abundant and incredibly clean 
source of energy if effective harvesting and im- 
plementation can be developed, but attempts 
at gleaning it from sources like air and water 
have been a bust. However, researchers are 
looking at mimicking the way certain bacteria 
emit hydrogen as a possible solution. 

As the march toward better mobile power 
solutions continues onward, there is not yet a 
clear frontrunner. Virtually all of the tech- 
nologies being explored today have a shot at 
being our answer to the problem, but none 
are close to being "the one." 

by Seth Colaner 

PC Today / January 2009 57 


Looking to improve the functionality of 
your mobile phone? We've compiled 
the most recently released applica- 
tions and program updates for smartphones 
to help business travelers maximize the po- 
tential of their mobile devices. 

■ New Titles For Windows Mobile 

Whether you use your WM phone for 
business or personal use, it's likely that you 
have some sensitive data stored on the 
phone's memory. To help you wipe all the 
personal data off your phone, Aiko Solu- 
tions' SecuWipe ($39.95; www.aikosolutions 
.com) overwrites the memory using meth- 
ods that comply with U.S. Department of 
Defense standards. Ideal for use before 
switching or recycling your WM phone, 
SecuWipe essentially makes your contacts, 
call records, email, notes, recordings, and 
browsing history unrecoverable. 

If your travels take you to numerous des- 
tinations, you may find it difficult to keep 
track of the weather conditions you'll face. 
The aptly named Weather (free; vitotech application from Vito Tech- 
nology provides the current temperature, 
two-day highs and lows, and an icon indi- 
cating the forecasted conditions for a city. 
You can set Weather to cycle through as 
many cities as you wish. You also can choose 
whether to view temperatures in degrees 
Celsius or Fahrenheit. 

Have you ever wanted to remotely play, 
pause, or fast-forward songs on your com- 
puter's media player? SFR Software's 1-2- 
Remote ($25.95; is an 
application for your Pocket PC that lets you 
control Windows Media Player or iTunes via 
Bluetooth, a wireless Internet connection, or 
USB. 1-2-Remote features all the typical 
media player controls, and you can also 
manage playlists, locate information about 
the current music track, and switch between 
equalizer presets. 

Online games are a great time killer. Spb 
Online Games ($14.95; www.spbsoftware from Spb Software lets you play 
English Checkers, Russian Checkers, Hexa- 
gon, and Reversi with other players online 
from your WM phone. The mobile applica- 
tion also lets you chat in real time with your 
opponents and active online players. Spb 
Online Games is compatible with smart- 
phones that run WM5 or later. 


Resco Contact Manager (price TBA; from Resco is a touch- 
optimized application for WM phones 
that's designed to let you navigate your 
list of contacts and contact information 
with finger gestures. For ease of use, Resco 
Contact Manager features a Contacts letter 
bar and displays text message conversa- 
tions in a chat-like view. You can assign pic- 
tures to your contacts and manage your 
contacts in group sets. 

■ New Titles For BlackBerry 

With hundreds of contacts in your 
phone, a filtering system may be a neces- 
sity. WebMessenger's Message Alerts 
($24.95; lets you 
define filters that apply to your incoming 
phone calls, email, and text messages. Us- 
ing Message Alerts, you can use your MP3 
or WAV files to indicate alarms, and you 
also can control the time of day and week 
when the rules or alerts are active. Another 
reason we like Message Alerts is because 
you can automatically redirect messages 
to other contacts, such as team members 
or management. 

Pocket Informant for BlackBerry ($19.95; from WebIS provides an in- 
terface with Agenda, Day, Week, or Month 
views — in addition to Task and Contact 
views. Unlike BlackBerry's integrated PIM 
(personal information manager) applica- 
tion, Pocket Informant lets you write notes 
about your appointments, tasks, or contacts 
to store detailed information about each 
encounter. Category colors and icons let 
you quickly identify items that require im- 
mediate attention. Pocket Informant for 
BlackBerry lets you set alarms for tasks, and 
configurable Snooze times let you prioritize 
late actions. The application is compatible 
with BlackBerry OS 4.1 and up, including 
BlackBerry Bold. 

■ New Title For iPhone 

The iPhone and iPod touch are great for 
storing photos, and Fliq (free; www. mark from Mark/ Space lets you send 
photos to other users without opening your 
email or sending a text message. At the 
touch of a button, you can use Fliq to share 
photos and contact information with anyone 
on the same wireless network. To download 
Fliq, visit the App Store on iTunes. 

■ New Titles For Multiple 

Just like a corporate takeover, Spore Ori- 
gins (starts at $2.50; 
from EA requires you to gobble up smal- 
ler creatures to move up the food chain. 
Available for a variety of mo- 
bile phones and iPhone/iPod 
touch, Spore Origins is divided 
in 18 sections where you can 
customize your creature to add 
abilities that make it more 
adaptable to undersea life. 
Users playing the mobile ver- 
sion of the game reported- 
ly completed it in nearly an 
hour, whereas the full version 
follows the creature's evolu- 
tion from a microscopic to 
cosmic being. 

HyperOffice (monthly fee 
varies by number of users; is a 
Web-based application suite that lets you 
sync and share Outlook, documents, and 
data with team members who don't have 
Exchange or SharePoint. HyperOffice re- 
cently announced that the collaboration ap- 
plication provides support for Spanish. 

■ Updated Software 

Nokia released Mail For Exchange 2.7 

(free;, which lets all S60 
3rd Edition phones use Mail For Exchange. 
Additionally, version 2.7 includes new 
fields for your contacts, including Middle 
Name, Car Phone, Department, Spouse, and 
Anniversary. Maybe most importantly, the 
2.7 update lets you use the Exchange Server 
2007 Autodiscover feature to automatically 
synchronize your phone with Exchange 
Server 2007. 

Skyfire (free; is a mo- 
bile Web browser that's currently in beta 
testing. Version 0.8, the newest version, 



crd: |************* 




1 QK 

1 Cj!.L-| 


1J3 1 |2 |3 A 

|5|G 7|0|9 

-1- + 


'l.< ./,»,' I»l. 

»yt 1 

CAPf a [ f> rd 

r olhlilkhf 

Shift 2.JKU 



ctiw ivi 


SecuWipe completely 
removes all confidential 
and personal files from 
your Windows Mobile 

offers improved speeds for graphically 
intensive Web sites, such as MySpace, 
YouTube, and ESPN, giving users a full- 
featured, mobile Web browser. One of 
the more unique features of Skyfire is 
its support for Ajax, Flash, QuickTime, 
Windows Media, and other Internet vid- 
eo formats. 

Version 6.0 of Quickoffice 
($70; — 
a suite that lets you remotely 
access, browse, and open files 
stored in Internet cloud ser- 
vices and files on corporate 
servers — includes new securi- 
ty features for using encrypted 
and password-protected Word 
and Excel documents. The up- 
date also adds several new 
features, including a file man- 
ager that lets you open, edit, 
and save Zip files. For faster 
response in Adobe's Mobile 
Reader, Quickoffice 6.0 features 
Adobe's latest PDF software. 

Resco announced version 1.90 of its Pock- 
et Radio ($19.95), a WM application that lets 
you listen to and record Internet radio sta- 
tions. Version 1.90 works with Bluetooth 
stereo headsets and includes a Today screen 
plug-in, making it easy to open and operate. 
Resco Pocket Radio offers nine preset station 
buttons to let you quickly switch among 
your favorites. 

Tablet PC users will want to note that 
PhatWare released version 3.0 of PenOffice 
($59.95;, handwriting 
recognition and collaboration software 
for Windows-based computers. The new 
version recognizes handwriting in Dutch, 
English, French, German, Italian, Norwe- 
gian, Portuguese, Swedish, and Spanish. 
PenOffice 3.0 also lets you add handwritten 
notes to Microsoft Office applications and 
embed control gestures into the notes. 

by Nathan Lake 

Fennec Means Firefox Mobile 

Although it's still in Web developer testing, keep an eye out for Fennec 
from Mozilla— the brains behind the Firefox browser. Mozilla indicates the 
interface will reflect Firefox's design principles while adding features, such as 
touchscreen support, that are appropriate for mobile phones. 

PC Today/ January 2009 59 




Notes On The Latest 
In Digital Music & Video 

usic, photos, videos, movies, TV 
shows, podcasts, FM radio, audio 
books, calendars, contacts, file 
browsers, touchscreens, Wi-Fi, Bluetooth, and 
on and on. Yeah, today's portable audio and 
video players give you pretty much the whole 
enchilada and a side of nachos to boot. For the 
latest software, hardware, accessories, ser- 
vices, content, and tips concerning portable 
audio and video players, belly up and dig in. 

■ MGM Hits YouTube 
With Full-Length Movies 

Frequent visitor? Fan of TV 
shows and films produced at MGM Studios? 
Well, you can now satisfy your fix for both in 
one spot. Google-owned re- 
cently announced it will post full-length MGM 
films and TV episodes. This follows a similar 
move in the fall in which YouTube posted full- 
length CBS programs, including "Star Trek" 
and "MacGyver." Both ventures exceed the 
usual 10-minute limit placed on user-posted 
videos. The moves also put YouTube within 
closer reach of, which has had re- 
cent full-length episodes from Fox, NBC, and 
CBS available for months. Look for MGM TV 
on one channel and MGM movies on an- 
other. You will have to put up with ads while 
viewing. Also coming soon is new program- 
ming exclusively produced for YouTube by 
London-based FremantleMedia, producers of 
"American Idol." 

Elsewhere, RevoluTV ( 
/ site /revolutv/ Home) has updated its online 
Internet TV player, which grants access to hun- 
dreds of free channels in one tidy interface for 
PC-based viewing. RevoluTV works with 
Windows XP and Vista systems, and channels 
include Movies, News, Entertainment, 
Lifestyle, Sports, Music, Weather, and many 
others. Meanwhile, if your inner child needs 
satisfied, Sesame Workshop recently detailed it 
will make full episodes of "Sesame Street" 
available for watching and purchase online at 
iTunes, Hulu, and iTunes will 
sell full episodes from season 35 and onward at 
iTunes for $1.99 each. Expect a "Sesame Street" 
channel at YouTube with more than 200 
"Sesame Street" clips and 30 celebrity/ guest 
appearance clips at Hulu. 

■ Cases & Accessories 

Despite recent American Heart Association 
research that suggests a magnetic substance 

60 January 2009 / 


■ Cowon's 02 Comes Stateside 
& That's A Good Thing 

Even first-time PMP (portable media player) 
buyers know Apple rules the landscape stateside 
with its iPod arsenal. Those who follow PMPs 
more on a global scale, however, have long 
revered South Korean manufacturer Cowon for 
the staggering amount of audio and video for- 
mats its PMPs support. Cowon's very tempting 
new touchscreen, 02, is no exception. Now ship- 
ping stateside, the 02 handles handfuls of file 
formats, including several lossless audio vari- 
eties. Further, the 02's mini USB port does TV- 
out duty (cable sold separately) and includes 
HD-quality (720p) playback capability. A photo 

viewer supports six formats (TIF and RAW included), and a CSD (compact shared 
document) viewer does Excel, HTML, PDF, PowerPoint, and Word viewing. 
Nearly as enticing is the eight hours audio and 18 hours video playback the inte- 
grated li-polymer battery is rated for. Also alluring is the 02, Cowon's first 4.3-inch 
(480 x 272) widescreen PMP to use flash memory, which comes in a 32GB model 
($299.99), as well as 8GB ($219.99) and 16GB ($249.99) models available in black or 
white. Other goodness includes an SD/SDHC card slot, built-in speaker, 10-band 
custom equalizer (eight presets included), JetEffect sound-enhancing effects (3D 
Surround, MP3 and bass enhancing, and so on), and FLAC-based audio recorder. 

Cowon's new 4.3-inch 
touchscreen 02 PMP is not 
only attractively priced, but 
it will also play seemingly 
any video or audio format 
you throw at it. 

■ AM Radio In Your Pocket 

Digital audio players that can dial in FM radio sta- 
tions are standard fare these days. You'll be hard- 
pressed, though, to find even one readily available 
model that can do the same with AM stations — until 
now. With its CC Witness, California-based C. Crane 
says it has "the only digital MP3 recorder /player that 
also has both AM and FM radio onboard." The Witness 
comes with 10 presets for each band and can record on 
both sides of the dial, including in stereo for FM sta- 
tions. Better, you can set 20 timed recordings with a re- 
curring option, while mic and line-in support means 
you're not restricted to recording only radio. (An op- 
tional Voz Stereo Microphone for high-quality record- 
ings is coming.) Outside the AM realm, the Witness 
becomes more pedestrian. There's an integrated cal- 
endar, alarm clock, and built-in speakers but only 2GB 
internal memory available within the largish exterior 
(3.6 ounces; 4 x 2.2 x 0.6 inches [HxWxD]). A memory 
slot can bump the storage limit to 16GB, but a 1.8-inch 
monochrome screen and adherence to strictly MP3 files 
somewhat negates the gain. Arguably worse is the 
Witness' $229.95 price. Still, if AM radio talk shows get 
you through the day, pay witness to the Witness. 

common in some MP3 player headphones can 
deactivate a defibrillator and interrupt a pace- 
maker's beat, we bring you news concerning, 
yes, headphones. First, Griffin Technology 
( has updated its 
TuneBuds Mobile ($39.99) and SmartTalk 
headphone adapter ($19.99). Both 
now have an inline, noise-canceling 
ControlMic that's compatible with re- 
cent Apple-made music players. 
ControlMic, built into a tangle-resis- 
tant nylon cord, includes a button that 
switches between calls and music 
functions. The SmartTalk has the 
same mic setup but works with any 
headphones. The SmartTalk and 
TuneBuds are compatible with Griffin's iTalk 
(free), a recently released sound-recording 
app available at iTunes. The iTalk records 
Good-, Better-, or Best-quality AIFF (Audio 
Interchange File Format) files on iPhone, 
iPhone 3G, or 2G iPod touch models that 
are playable in iTunes and other media 
players. A companion, PC-based iTalk Sync 
app ( transfers recordings 
via Wi-Fi between devices and computers. 

V-Moda's ( pricier, 
noise-isolating, and iPhone-compatible Vibe II 

with Microphone ($119.95), meanwhile, uses 
BLISS (bass level isolating soft silicon) tech- 
nology that "comfortably reduces noises and 
enables deep bass." In other words, none of the 
buzzing or hissing that battery-powered noise- 
canceling headphones produce. Stainless steel 

Griffin Technology has updated its 
TuneBuds Mobile earbuds and SmartTalk 
headphone adapter to support the latest 
iPhone and iPod players. Both releases are 
compatible with Griffin's recently released 
iTalk, a sound recording app for iPhone 
and 2G iPod touch players. 

alloy protects the onboard V-Masque dynamic 
drivers, which offer an "unparalleled high- 
definition, 3D soundstage" that in- 
vokes "the sense of a live music expe- 
rience" by way of "vibrant bass, vivid 
mid-range, and vivacious highs." A 
fabric-based cord adds comfort and 
uniqueness, while built-in call /music 
controls provide convenience. 

For 4G iPod nano owners, Los 
Angeles-based Agent 18 ( 
recently released the soft-silicon FlowerVest 

case ($24.95), which sports pink or yellow/ 
white flower imprints to bring out your lighter 
side. Agent 18's transparent ClearShield case 
($24.95), meanwhile, uses interior rubber pads 
to absorb shocks and has a hard outer shell to 
safeguard against nasty spills. A NanoShield 
for iPod nano Kit ($34.95) gives you the case 
and armband and universal dock. Finally, 
Seskimo's ( BatRest leads 
you to believe the Dark Knight's utility belt is 
one gadget lighter, but the BatRest is actually a 
credit card-sized (just 1.2mm thick) cradle/ 
stand for the iPhone, Android Tl, and other 
curved-back video-playing devices. Notably, 
the polypropylene-constructed frame can 
tuck away comfortably in a wallet when not in 
use. Seskimo has black, white, and clear 
models and only charges $3.99 for each. If your 


Feeling a little batty? Then 
hook up your iPhone, iPod 
touch, T-AAobile T1, or other 
video-playing portable player 
with the BatRest from Seskimo. 

media player has a flat back, try Seskimo's 
BullRest ($2.99). 

PC Today /January 2009 61 


Compiled by Blaine Flamig 

construction Zone 

The Latest Hotel & Airport News 

Hotel Construction News 

Returns To Seattle 

After pulling up stakes in Seattle roughly five years 
ago, Four Seasons returned to the city in November 
2008 with the opening of a downtown, waterfront Four 
Seasons Hotel Seattle. Standing 21 stories, the $150 mil- 
lion hotel features views of Elliott Bay, Puget Sound, 
and the nearby Olympic Mountains. The hotel's 147 
guest rooms and 36 private residences are also within a 
five-minute walk of the Seattle Art Museum, Benaroya 
Hall, and Pike Place Market. Beyond a 6,000-square- 
foot spa area with outdoor infinity-edge swimming 
pool and fireplace overlooking Elliott Bay, business 
travelers can expect 10 meeting rooms; a 24-hour busi- 
ness center; express check-in/ check-out; and airline 
reservation, secretarial, and translation and interpreta- 
tion services. A Grand Ballroom, meanwhile, features 
two-story windows with mountain and waterfront 
views, while an ART Restaurant and Lounge (with chef 
Kerry Sear) includes "sculpture featuring woods native 
to the Pacific Northwest" and floor-to-ceiling windows 
with "sweeping views" of Elliott Bay and the Olympic 
Mountains. "The new Four Seasons will allow guests 
and residents to experience the Northwest like never 
before," John Oppenheimer, Seattle Hotel Group man- 
aging partner, stated in a recent news release. 


Coming To City Of Brotherly Love 

A 2010 groundbreaking and spring 2012 opening are set for a new five-star Wa- 
ldorf-Astoria in Philadelphia. The glass- and granite-constructed Waldorf-Astoria 
Hotel & Residences Philadelphia from Mariner Commercial Properties and Gatehouse 
Capital is priced at $420 million, and when completed, the 670-foot, 58-story hotel will be 
Philadelphia's sixth tallest edifice and largest mixed-use hotel and residential property. 
Cope Linder Architects will design the hotel, which includes 175 guest rooms and 136 
residences starting at $1 million. Residents will have a private lobby, Club Room, onsite 
storage, and elevators. Residents and guests will share the 5,600-square-foot Jewel Box 
Ballroom, 14,000-square-foot spa and fitness center, 350-valet parking garage, babysitting 
service, and more. A sky lobby located 155 feet above street level and promenade leading 
to two restaurants are also planned. The developers reportedly will emphasize using sus- 
tainable products during construction and have planned such green touches as a vegeta- 
tive roof, active-chilled HVAC system, and the use of various automation technologies. 
"What really sets this project apart is the unprecedented level of luxury we are offering 
our guests and residents," says Marty Collins, Gatehouse Capital president. 

A 2012 opening is slated for a new Waldorf-Astoria Hotel & Residences in Philadelphia. 

I rflliMHiiniilv 

62 January 2009 / 


DOUBLETREE HOTELS Gets Personal With Guests 

Most hotels do what it takes to accommodate guests after handing 
over the room key. At 190 participating Doubletree Hotels in North 
America, however, you can "have exactly what you want from the 
moment you arrive" via a recently launched Doubletree Requests 
Upon Arrival program. This mirrors an identical initiative from Hil- 
ton Hotels, which owns the Doubletree brand. In a nutshell, Requests 
Upon Arrival lets Doubletree guests preorder complimentary, for- 
purchase, and upgrade items when booking a room. "Doubletree con- 
tinues to explore ways to empower our guests with choices that will 
enrich their travel experiences and ensure their time with us is satis- 
fying, relaxing, and enjoyable," stated Mary Beth Parks, Doubletree 
Hotels vice president of marketing. "Now, through our Doubletree 
Requests Upon Arrival program, guests have an opportunity to per- 
sonalize their stays more than ever before by selecting added conve- 
niences to help them make the most of their travel time." Options 
include everything from upgrading to a room with an ocean view to 
requesting extra pillows to having Doubletree chocolate chip cookies 

Doubletree Hotels' Request Upon Arrival program lets guests 
preorder complimentary, for-purchase, and upgrade options when 
they book a room. 

and a glass of milk waiting when you walk through the door. Double- 
tree also offers destination-specific options. Combined, Requests Upon 
Arrival is available at more than 450 Hilton and Doubletree hotels in 
North America. 

Airport Construction News 

Opens New Terminal 

Airport opened a 
new $1.1 billion 
terminal on 
Veterans Day. 

■ After more than 33 years of planning, Indianapolis International Airport officials 
finally celebrated the opening of the new 1.2 million-square-foot Col. H. Weir Cook 
Terminal last year on Veterans Day, complete with descendants of WWI aviator Col. 
Cook in attendance. Officials welcomed the terminal's first passengers at roughly 
8 p.m. with the arrival of United Airlines Flight 7622 from Chicago. Upon testing a 
new $25.6 million baggage system, the first departure took place the next morning. 
"This is our place to welcome home our troops, to hug our family members at the 
holidays, and hopefully to bring back another Super Bowl trophy," said Indianapolis 
Mayor Greg Ballard. The $1.1 billion terminal reportedly marks Indianapolis' second 
largest public works project ever and provides the airport with 40 gates (expandable 
to 100) stretching across two concourses that can handle 12 million passengers a year 
(up from 8 million annually). Construction on the glass-constructed terminal took 
three years but finished on time and within budget (federal grants and airline sub- 
sidies funded construction vs. local or state taxes). Beyond a sloping 82-foot-high 
ceiling, other features included about 50 stores and restaurants, nearly $4 million 
in art (including works from Indiana-born artists), moving walkways, expanded 
parking, and seven security lanes (three self-select). 

Get A Face-Lift 

■ Planning a business retreat from the mainland to Ha- 
waii soon? Expect to run into construction projects at four 
local airports following Hawaii Gov. Linda Lingle's release 
of about $20.1 million in late October 2008. Part of a $2.3 
billion, 12-year Administration Airports Modernization 
Plan, the funds will go toward capital improvement pro- 
jects at Hilo International Airport, Honolulu International 
Airport, Kona International Airport, and Lihue Airport. 
About $3.2 million will add 427 parking stalls and im- 
prove pedestrian walkways, lighting, and landscaping at 
Hilo. Meanwhile, about $9.7 million will go to replacing 
nearly 30 escalators at the Honolulu airport, 75% of which 
are more than 20 years old. Construction will start in April 
and finish in June 2010. Kona will receive $3.2 million to 
build an interim terminal to house a lounge area, offices, 
and baggage storage starting in March. Finally, Lihue 
Airport will receive nearly $3.97 million to add about 422 
parking stalls and complete a restoration project involving 
the former Ahukini landfill area that Hawaii's Department 
of Transportation owns near the north end of the airport's 
runway. Both projects are scheduled for a December com- 
pletion. "Government spending on capital improvements 
creates jobs in the construction industry and stimulates the 
broader economy," Gov. Lingle said in a recent news re- 
lease. "It also ensures that we have modern infrastructure 
in place for when the economy starts to expand again." 

PC Today /January 2009 63 


Ml 111 

Travel Web Sites & Business Travel 

Sometimes knowing your destination 
is the easiest part of traveling. Work- 
ing out your trip planning details 
can be quite a chore, though, if you don't 
have the right resources. There are plenty of 
travel sites on the Web just waiting to assist 
you, but it isn't always easy to dig out the in- 
formation that pertains to business travel. To 
counter that, we've done some digging for 
you. This article covers some of the best leads 
in business travel preparedness info on the 
Web. Check out each "Site Tip" for something 
you might find particularly useful or fun. 

Business Traveller 

This site is overflowing with valuable fea- 
tures, news, and guides for frequent business 

travelers. The Tried & Tested category pro- 
vides reviews for international, business- 
class, and first-class hotels. If you want to get 
a quick update on the latest excitement global 
cities have to offer, click City Guides. Click 
Plan & Book to find essential travel tools for 
arranging your trip; this section also includes 
a currency converter, seat plans, and current 
flight information. 

Site Tip: The Loyalty section allows you 
take advantage of various discounts. 


If you become a member of cFares ($50 per 
year), you'll be able to take advantage of 
wholesale airfares. cFares is similar to other 

brand-name travel sites in that you can im- 
mediately search for round-trip, one-way, 
and multi-city flights; yet it claims to give 
you fares that are cheaper than 90% of 
Internet fares overall by comparing prices 
from airlines, travel agencies, and whole- 
salers. When you confirm your travel on 
cFares, you buy your fare from the merchant 
instead of from an airline Web site. 

Site Tip: Platinum membership benefits in- 
clude market fares and reduced prices. 

Farecast Beta 

Use Farecast Beta (part of Windows Live) 
to decipher whether airline prices for domestic 
flights between major destinations will vary in 

64 January 2009 / 


Advice That Fits In Your Carry-On 


ore seasoned jetsetters will know that helpful travel information can come to you in a variety of forms. Pull out your notebook 
or UMPC and check out these interesting Web sites during your layover— you may learn some surprisingly useful travel tidbits. 

Business Travel Logue 

This all-encompassing business travel blog divides travel in- 
formation into five categories: Entertainment, Frequent Flyer, 
Hotel Rewards, Information, and Local Travel Info. Information 
covers travel insurance, private jet travel, and airline credit card 
information. If you want minute-by-minute updates on your 
flight, simply type in your airline name, code, and flight number. 

Site Tip: Business headlines highlight useful domestic and in- 
ternational travel news. 



Common sense is useful everywhere, especially when you're 
traveling to places you're not accustomed to. Click the Travel 
Tips link for tips on trip preparation, avoiding travel scams, 
driving in unusual places, and general travel safety. Consumer 

resources will keep you informed about the latest travel alerts. If 
you're in need of a trip quote, you can get one for free through 
TravelSense from the American Society of Travel Agents; just 
click the Get Free Trip Quote button on the home page. 

Site Tip: The Travel Videos link leads to "City by City" videos 
covering destinations in the United States and Europe. 


Want the truth about airline and airport conditions? Skytrax 
provides traveler reviews, seat guides, and airline news. To get 
the scoop on airlines and flights directly from passengers, click 
Airline Reviews and Airlines A-Z List. Anyone can submit an air- 
line review. Be sure to follow the review guidelines before you 
send comments to Skytrax. 

Site Tip: If you want to discuss travel topics while on the road, 
log on to the Skytrax Chat Room. 

the upcoming days. Enter your To and From 
information and look for the low fare predic- 
tion on the left side of the results page. To 
view a graph that shows low fares for partic- 
ular times in the next month, click Details. 

Site Tip: Click the Airfare Deals link to 
find record low flight prices. 


FlyerTalk is a one-stop shop for firsthand 
information about frequent flyer topics, 
dining, and travel generally. Click a Forum 
link and then click a recent thread topic to 
read about travelers' experiences — both good 
and bad. Be sure to register before interacting 
with the FlyerTalk community. 

Site Tip: Click Frequent Flyer Wiki under 
Extras if you travel, as FlyerTalk puts it, 
"A LOT." 

Last Minute Travel is the self- 
described " ultimate one-stop superstore for 
the time-sensitive, deal-seeking traveler." Of 

course, you can do a quick search on this site 
for flights, hotels, and vehicle rentals, but to 
really cut down on Web time, click Packages, 
where you can book all three at once using 
the Speed-Book. 

Site Tip: Get "Off The Record" hotels by 
clicking a destination in Deals. 


SideStep combines travel data from more 
than 200 travel Web sites to help cut out the 
"middle-site" when you're searching for the 
best travel deals. Use the simple search en- 
gine to check multiple sites for ideal prices. 
You can search the top 25 cities in the Buzz if 
you happen to be looking for a vacation 
idea — while you're on business, that is. 

Site Tip: The free SideStep Toolbar auto- 
matically searches Web sites to find great 
travel deals. 


If you're not familiar with TripAdvisor, 
then it's time to get to know this user-friendly 

trip planner. Choose your destination from 
the world map; from there, you will learn 
about things you need to know before you go 
and what type of fun you can have during 
your downtime. TripAdvisor will even give 
you ideas for your next getaway when you 
land on a category in Trip Inspiration. 

Site Tip: The free applications and down- 
loads in the Fun & Games section are 
worth your time. 


Need an international flight, pronto? Direct 
your browser to Using the inter- 
national map (a la Google Maps), you can 
narrow down your flight path from starting 
point to destination. Vayama connects the dots 
and then instructs you to the Find A Flight box 
to start planning your trip. Under the On The 
Ground category, search for airport parking 
and transport available at your next locale. 

Site Tip: Use the Country Etiquette page 
for information to help you assimilate into 
the culture you're entering. 

by Joanna Safford 

PC Today /January 2009 65 

Washington Dulles 
International Airport 

Instant Guide To IAD 




IAD By The Numbers 


IAD (official code for Washington Dulles Interna- 
tional Airport) was the 22nd busiest U.S. airport 
by mid-2008 in terms of aircraft movements, ac- 
cording to Airport Council International. IAD handled more 
than 24 million passengers in 2007. 


In 1962, IAD introduced 
Chrysler-made mobile lounges, 
each 54 feet long and designed 
to carry 102 passengers be- 
tween terminal and aircraft. 

President John F. Kennedy 
dedicated the airport, 
then simply known as 
Dulles International 
Airport, on Nov. 17, 1962. 


6.2 billion 

IAD generates $6.2 billion for the 
local economy each year and em- 
ploys more than 18,800 people, according to the Metropol- 
itan Washington Airports Authority. 



American Airlines Admirals Club 

• Concourse B, near gate B63 (temporary location) 
Open daily, 5:30 a.m.; closes at 7 p.m. Sunday 
through Friday and at 6:30 p.m. on Saturday 

Northwest Airlines WorldClub 

• Midfield terminal, concourse B, near gate B19 
Open Sunday, 6:30 a.m. to 7:45 p.m.; Monday 
through Wednesday, 5:30 a.m. to 7:45 p.m.; 
Thursday through Saturday, 5:30 a.m. to 6 p.m. 

United Airlines Red Carpet Club 

• Midfield terminal, concourse C, near gate C7 
Open daily, 6 a.m. to 9:30 p.m. 

• Midfield terminal, concourse C, near gate C17 
Open daily, 6 a.m. to 9:30 p.m. 

• Midfield terminal, concourse D, near gate D8 
Open daily, 6 a.m. to 9:30 p.m. 

Make A Wi-Fi Connection 

When you start your notebook or Wi-Fi-enabled device, turn on the Wi- 
Fi radio, and launch your browser, you should see IAD's splash page 
and access to airport information. For complete Internet access, select your 
provider (AT&T and Boingo are among the offerings) and log in. 

Speed Through Security 

Clear Registered Traveler program ( venues are located 
at all gates in IAD's main terminal; they operate from 4:45 a.m. to 9:15 
p.m. on weekdays and 6 a.m. to 9 p.m. on weekends. If you take two or more 
flights per month, travel alone, and don't check any bags, you might qualify 
to use IAD's Dulles Diamond service. The service lets you save time by going 
through a special checkpoint on IAD's Arrivals Level. 

Need to find airport info fast? Visit and click the Airports link on the left under Services. 

Compiled by Calvin Clinchard 

66 January 2009 / 


Local & Long Distance Calling 

Per Month 1 

For Three Months 

See Below For Details 

Get UNLIMITED Local & Long Distance Calling for only $9.95/mo t for three months! 


• Our price Starts Low and Stays Low SM . 

Satisfaction Guaranteed < 

• No bundles, no hassles — just reliable 
phone service at a reliable price 


• Keep your existing phone number A 

• Vonage® works with your existing home 
phone and high-speed Internet connection 

• 25 Premium Features at no extra cost 

• Free calls to 5 select European countries and 
call other International locations for as low as 
1 cent per minute v 





See Below for Details 

Call: 1.800.910.8064 

t Rates exclude: broadband service, regulatory and activation fees and certain other charges, equipment, taxes, & shipping. International calls billed per minute. Offer valid in the US only. 
See Terms of Service for details. V Free Calls to Europe Offer (Available Only with Unlimited Residential Plan) Does Not Apply To Certain Call Types, Such As Calls to Cell Phones, and is 
Limited to Italy, France, Spain, UK and Ireland. Other International Rates May Vary, See for Details. Vonage 91 1 service operates differently than traditional 911. 
See 1 for details. High-Speed Internet or Broadband Required. Alarms and other systems may not be compatible. < 30-day money back guarantee is refunded for any 
paid activation fee, 1st month service charge, initial shipping charges and termination fee. Applicable only to first ordered line per account. Available only in the event of timely cancellation 
for subscribers who have not exceeded 500 minutes of usage and who obtain a valid return authorization number from 1 -VON AGE- HELP, and return of equipment in original condition and 
packaging within 14 days of cancellation. Refund will not include charges for taxes, international usage, payphone calls to Vonage toll free numbers and directory assistance. Offer revocable. 
A Where available. The number transfer process takes approximately 10 business days from the time you confirm your transfer request. ©2008 Vonage. 

PC Today /January 2009 67 

Business Travel 911 

— Business . 


nexpected things happen when you're traveling. You lose the ability to access the 
corporate network. A customer sends you an important file, but you can't open it. Your PDA 
crashes. Batteries die. Credit cards get stolen or lost. If these or other urgent situations happen to 
you when you're on the road, our Business Travel 911 articles can help. 

Business Travel 911 articles are available to anyone with Internet access, even if you don't sub- 
scribe to PC Today magazine.* Simply 
point a browser to r^J^ %J!B fei/^1 

and click the Business Travel 911 link on the left for a complete 
menu of helpful articles. 

Business Travel 911 articles, including online versions of 
those printed on the following pages, are updated regularly. 
For articles that help you when you can't access the Internet, 
we suggest you print and take them with you when traveling. 
If you're a subscriber and you logged in on the home page, you 
can use the Print This link at the top of any article for a printer- 
friendly version. 

*Only paid subscribers to PC Today, Smart Computing, or 
Computer Power User receive full access to all of the content 
available on PC Today's Web site. 

GET MORE ANSWERS also offers numerous resources designed to 
make life easier for business travelers. Scroll down a little on 
the home page to find our Wi-Fi Hotspot Locator, powered by 
J i Wire. Or check out the Search For Flights, Hotels & Rental Cars 
box to start making your travel plans. And the Services menu on 
the left side of the home page offers links to Web sites and phone 
numbers for airlines, airports, hotel chains, and more. 

Equipment Problems 

! ''::::? .'. :- - -?. -:. ' a. ::?.: :- ■- , =:;- 
1 Crank It Up 

: sttsries 
1 Deal With A Crashed PDA 

1 Mod em Pre !:!?■'• = 

] . ..'::? :■::-•■-"■; f : .:■■' i^ - . :: -■ :.:; ; -s 

1 Projector Prci: ?-s 

1 Jet Lag & Other Sleep Difficulties 
1 '.:::- : : ;;; 

1 ■ = .? i- ■■ :. ■ -;;:~ 

Remote Connections 

1 :::■■■-- ■:-:":■. , - :: -:.:—; 

] ',.:■ -■::?:: ::s' : ~---; ~: _ a .';: 

] i : .t e: : I : f :: : • = ;.: ;-; 

] Solve '.■■■'II frk-; ; ' L . -. . : t :tn;:ii Pro hi em-;. 

] Symantec p: Anywhere 11 :, Trc".il:leiriootiri-:i 

1 Use Your [ .isJem 

1 Use Your Nokia Phone As A. Modem 

Software Problems 

1 'J?.-: ;.■.:■;- -.-I'- - ; 

! .='■ : .:■;•--:.• t r - ■-; = ■; 

1 Can't Open That File 

] Z'z::? .'.:■' - . .; :.s t- ~ : ^:\j: ' :;-f : ::. - 

! - ;:■- '. -.i- '■■?.■ ". :- i -rssed File 

1 Fast Number-Crunching With Excel 

] p.h; ; -::i I Ll-yi-H-iierrient 

] '.--. ■■-:■ Bi.lllit'Hij 

1 '-■-?■'-■'. '-.. 't - i: = : :. ;f;;";.:T: 

1 Jet Lag 

] Lost Luggage 

] L:;r pHvi | :ijrt 

I , ; -:-:-:. ■?:. ... ::::s::-^ 
1 Rental Car .'.-■;:■ -a ;:e 

68 January 2009 / 

Business Travel 911 

Need Help Right Now? 

If you don't find the help you need in the Business Travel 911 department in this issue or on, visit our online Tech Support Center at 

Search Or Browse 

You can look for answers first by entering a search term in the search box toward the top of the 
page and clicking the Search button. You can also browse the list of Top Subjects to find answers 
to common problems, or click the link under Solutions Knowledgebase to browse a list of com- 
mon problems and frequently asked questions. 

Fight Error Messages & Bugs 

Click the appropriate link under Error Messages to find out what a particular message means. Or 
scroll down to Security & Privacy to learn how to tackle malicious software (such as viruses and 
worms), spyware, and spam. 

Learn More 

At the Tech Support Center you'll also find links to troubleshooting articles on a variety of topics. 
Browse the headings on the main page to find a wealth of additional information, such as advice 
on setting up a wireless network and installing just about anything. 

PC Today / January 2009 69 

Business Travel 911 


OU appreciate the fact that Excel is a power-packed program, 
but you're also a professional on the go and, frankly, you don't have a lot of 
time to learn the finer points of the software. No sweat. In this short article, we'll 
give you some great ideas of how to kick up your Excel skills a notch without 
spending a lot of time doing so. 


One of the most powerful things you can 
do with Excel is play around with work- 
sheet values to answer "what-if " ques- 
tions. What if sales decrease by 6% next 
year? What if the cost of goods sold increases 
by 3%? 

To calculate multiple outcomes such as 
these, you can use Excel's Scenario Manager. 
This tool enables you to specify which data 
cells you want to change and then quickly 
view the result in the worksheet. 

To use the Scenario Manager, select the cells 
you want to include in the scenario and then 
choose Tools and Scenarios. In the Scenario 
Manager dialog box, click Add to display the 

You can use Excel's 


Scenario Manager to 

Worst Case 
Status Quo 

[ Show | 

Close | 

help you make sound 

| Add... j 

business decisions. 

Delete | 

| Edit... | 

Changing cells: 

| Merge... | 

Add Scenario dialog box. 



Type a name (such as 
Status Quo, Worst Case, 

Created by Production 

or Best Case) in the 
Scenario Name text box, and then specify 
which cells you want to change. Click OK and 
then enter a new value for each changing (vari- 
able) cell in the Scenario Values dialog box. 
Click OK, and the Scenario Manager dialog box 
will redisplay with the new scenario shown on 
the list. Complete the same steps for each sce- 
nario you want to create. Finally, to switch be- 
tween the scenarios, click on each one's name 
in the Scenario Manager dialog box and view 
the change directly on your worksheet. 


You can quickly locate all the cells in a worksheet that include a particular type of data, such as 
those that include comments or formulas. For example, if you want to identify cells in a selected 
range that contain formulas, press CTRL-[ (opening bracket); to find and select all cells with com- 
ments, press CTRL-SHIFT-O. 

You can also highlight all the cells in a range that include objects, such as clip art, charts, or pic- 
tures. This helps you quickly identify all the items so that you can then apply actions to them, such 
as resizing, moving, formatting, or grouping them. To select all of a worksheet's objects, click one of 
them, and then press CTRL-SHIFT-Spacebar. 


Although Excel includes more than 
300 functions, most business profes- 
sionals rely heavily on a handful of 
essential ones and then learn addi- 
tional functions as needs arise. We've 
compiled a list of some of the most- 
used functions and a brief explana- 
tion of their purpose. If you need 
more guidance using these functions, 
consult Excel's Help feature. 


Totals the values in a range. 


Averages the numbers in a range. 


Returns the maximum value in a se- 
lected range or set of numbers. 


Returns the minimum value in a se- 
lected range or set of numbers. 


Returns the number of cells that con- 
tain data in a range, such as a list of 
inventory items. 


Returns the serial number associated 
with a specific date. This function is 
often used to calculate the number of 
days between two dates. 


Returns one value if a specified con- 
dition is "true," a different value if 
the condition is "false." Helps you 
create various "what-if" scenarios 
and logically evaluate data. 


Rounds values to specific number 
of places. 

70 January 2009 / 

Business Travel 911 


You've probably noticed that it doesn't take long 
for a business worksheet to quickly mushroom in 
size, making it almost impossible to find data by 
simply scrolling. This is especially true when you're 
working on a laptop with a relatively small screen. 
It's also an inefficient way to find, let's say, one cus- 
tomer's name among several hundred. But help is 
at hand in the form of Excel's Find command. 

To use this command, first select the range in 
which you want to look for the data (or select a 
single cell if you want Excel to search through the 
entire worksheet). Choose Edit and then Find or 


IS) E» E* 

»n ;-«-■ Fpfiit !■:■ 

b L*a #>»» «rt 


1 J _>" d _ 

_l J j ?Ji A 

-j ji - y 

&S-JIW imiioo* - „| 


. « . ■ J 

U K * * 4 i 

* ' *JJS *» _->-A-i 


A W 


{ji M _| £ 

E F 

I I 


r q - 









•&•*«; :u(i 

cw» <■•■ I 


w^ ** ~ n"*eh«w 


»*"* I*"* Ji 

I "*<* I [ [""*'■ I I ■*« 

17 .J 



19 .W* 


** ^^^Ji^^™ 

'4.- :■:■■ 

vj*j^jmj^^ ^^* 

S) ys* tv* aW!WJ 

5J«pMpfe.>± 9nd£ 

Hum p«m* sfSDMS 

20 u<* 



iJlHPM*:* SxrcriM* 




simply press CTRL-F to open the Find And Replace 
dialog box. Enter the text that you want to locate, 
then click Find Next to highlight the next cell with 
your data; click Find All to display a list of cell ref- 
erences that contain the search text. 

By default, Find searches through cells with 
values, such as text or numbers. But you can also 
locate information buried in worksheet comments, 
even if they are not displayed. To do this, click 
the Look In drop-down arrow in the Find And 
Replace dialog box and then choose Comments 
from the list. 

The Find All option lets 
you efficiently locate all 
the cells in a worksheet 
that fit your criteria. 


In addition to helping you locate data, Excel can help 
you rapidly replace formulas, numbers, or text with 
other data. For example, you can update a name that 
appears multiple times in a worksheet. To do this, 
choose Edit and then Replace or press CTRL-H. In 
the Find And Replace dialog box, enter data in the 
Find What and Replace With fields. Click Find Next, 
decide if you want to replace the selected occur- 
rence, and then choose Replace. (If you're feeling es- 
pecially brave, you can instead choose Replace All 
without looking at each occurrence.) 


You can quickly calculate and display information 
about a selected group of values on Excel's status bar, 
which is located at the bottom of each worksheet. To 
do this, select the cells you want to add and then view 
the total on the status bar. But don't stop there. You 
can also display a wealth of other information about a 
selection by right-clicking the status bar and then 
choosing functions such as AVERAGE, MIN (min- 
imum), or MAX (maximum) on the pop-up menu. 


You can easily add comments to an Excel work- 
sheet, either for your own future reference or to 
share your ideas with others. To add these nota- 
tions, right-click in the cell 
where you want to place 
the comment, and then 
choose Insert Comment. 
Type your notes in the 
comment box and then 
click outside of it. 

If necessary, you can 
edit the contents of a 
Comment by right-clicking 
the cell, selecting Edit 
Comment, and then modi- 
fying the text as you would 
in a word processor. You 
can also hide, show, or 
delete a comment by right- 
clicking the cell that con- 
tains the Comment and 
then choosing the appro- 
priate command on the dis- 
played list. 


You're probably already familiar 
with many basic Excel keyboard 
shortcuts, especially when you 
take your laptop on the road and 
don't want to use the mouse. 
However, there are some little- 
known shortcuts that can help 
you work even more efficiently 
in selecting ranges and moving 
around a worksheet. 

For example, you can quickly se- 
lect an entire data region (a range of 
data cells bordered by empty cells) 
by holding down CTRL-SHIFT-* 
(asterisk). Another way to select a 
data range is to place your cell 
pointer in the range and then press 
CTRL-A; press CTRL-A a second 
time to select the entire worksheet. 
You can also press CTRL-Spacebar 
to select the column where your cell 
pointer is located. 

Another helpful keyboard 
shortcut is to press END followed 
by an Up, Down, Left, or Right 
arrow key to efficiently move the 
cell pointer to the outermost edge 
of a data range. 

You can use comments to jot down electronic notes on 
your worksheet. 

PC Today / January 2009 71 

Business Travel 911 



OuVe Struggled through security, dealt with delays, fought 
fatigue, and shrugged off stress to make it to your presentation on time, so 
the last thing you want to encounter is a no-go notebook and projector 
setup. Read on to get the show on the road. 


First, with all devices powered down, 
connect the VGA (Video Graphics 
Array), DVI (Digital Visual Interface), 
or S- Video cable for the projector to the 
corresponding port on your notebook. 
If your projector has a different inter- 
face than that of your notebook, you 
may need an adapter, such as a DVI-to- 
VGA adapter. Next, connect the power 
cord for the projector to an outlet. Also, 
connect the notebook's auxiliary power 
cord to an outlet. 

If your setup includes a Bluetooth or 
an IR (infrared) dongle for a remote, 
plug it in to an available USB port on 
your notebook. Some IR remotes require 
direct line of sight to function properly, so make 
sure the path between the adapter and the re- 
mote is unobstructed. If your setup lets you use 
the projector remote to control the cursor on the 
notebook, connect the cable to the USB mouse 
port, PS/2 port, or serial port on your notebook 
and the corresponding port on the projector, 
commonly labeled Control or Mouse. 

If you're using the projector's built-in speakers, 
make sure your notebook's headphone or line-out 
jack is connected to the projector's audio-in or 
line-in jack. If you're using an external sound 
system, look for a similar audio-in jack and make 
the connection. If your notebook features both 

1 ] romsnTFB I I 

: • ^ " ' ,.■:>,■. ■,- ■:■■ 

CJ © CD 


Remotes come in 
Bluetooth, infrared, 
and wired varieties. 

line-out and headphone jacks, 
use the line-out jack. Turn down 
the volume on your notebook 
and test the sound prior to begin- 
ning. Some sound-enabled pro- 
jectors and auditorium sound 
systems have dedicated volume 
controls, so adjust those first. 
Next, turn the projector on 
and boot up your notebook. Turn 
off the screen saver using the 
Display Properties dialog box. In 
Windows XP, right-click the 
Desktop, click Properties, click 
the Screen Saver tab, select None 

from the drop-down box, and 
then click OK. In Vista, right-click the Desktop, click 
Personalize, click Screen Saver, select None from the 
drop-down box, and then click OK. You'll also want 
to adjust your notebook's power scheme to make sure your presentation goes 
smoothly. In WinXP, navigate to the Screen Saver tab of the Display Properties dialog 
box, click Power, select Presentation (With Projector) from the Power Schemes drop 
box, and then click OK. In Vista, navigate to the Screen Saver Settings dialog box, 
click the Change Power Settings link, click the radio button in front of High 
Performance, click 
Change Plan Settings, 
set the Turn Off The 
Display setting to 
Never, click Save 
Changes, and click OK. 


If the projected image appears too 
dim, try moving the unit closer to the 
projection surface. This will shrink the 
overall size of the 
projection but im- 
prove brightness. 
Reducing the 
amount of light in 
the room will also 
improve the projec- 
tion's apparent 
brightness. Shut off 
the lights, close window blinds, 
and /or draw the curtains. 


Most projectors have a manual focus 
ring around the lens that lets you 
make subtle adjustments. The projec- 
tor's control pad, menu, or remote 
may also yield focus-adjusting con- 
trols. If you're using JPEG pictures or 
other compressed image files in your 
presentation, these photos may appear 
blurry when projected. To avoid this, 
try using higher-resolution photos. 

Connect the external 
display port on the 
notebook to the ap- 
propriate video input 
port on the projector. 

72 January 2009 / 

Business Travel 911 



If the projected image is cropped on the 
edges, then you need to adjust the note- 
book's resolution to match the projector's 
native resolution. Vista users can adjust the 

Resolution slider directly from the Display Settings dialog box. In Windows 2000 /XP, click 
the Settings tab and then adjust the Screen Resolution slider to the projector's native resolu- 
tion. Click Apply and then click Yes if everything looks good. If you don't know the native 
resolution of your projector, adjust your notebook's resolution to 800 x 600 and then click 
Apply. If the projected image is framed with black borders, then try 1,024 x 768. Continue 
trying higher resolutions until the image looks perfect. 




If your projector appears distorted or _ 

displays a "signal out of range" message, 
you may need to adjust your Display 

Properties. In WinXP, click Start, click Control Panel, and then double-click Display. 
(In Category View, click Appearance And Themes and then click Change The Screen 
Resolution.) On the Settings tab, click Advanced. In Windows 2000, click Start, Settings, 
and Control Panel; double-click Display; click the Settings tab; and then click Advanced. 
Vista users, right-click the Desktop and then click Personalize, Display Settings, and the 
Advanced Settings button. 

Although the Advanced Settings dialog box varies depending on your notebook's hard- 
ware, you should see a Monitor tab; click it to continue. In the Monitor Settings box, set the 
Screen Refresh Rate to 70Hz and click Apply. If this doesn't fix the image, continue trying 
successively lower refresh rates until the projected image looks right. 


If the projected image is upside down, then your 
projector is most likely configured to display 
from a ceiling-mounted position. If the upside- 
down image is coming from a projector that is 
mounted to the ceiling, then it is probably con- 
figured to project an image in front-projection 
mode. To fix either of these problems, navigate 
the projector's menu or control panel and set the 
projector to the appropriate mode. 


This trapezoidal effect usually occurs if the pro- 
jector is aimed toward the projection surface at an 
angle. Most projectors have a setting for adjusting 
this effect, called keystone distortion. If the pro- 
jector points up at an angle toward the projection 
surface, adjust the image's keystone setting to 
taper the top of the image. Alternatively, adjust 
the keystone to taper the bottom of the image if 
the projector points down at an angle. 


If the projected image is too small, try moving 
the projector farther away from the projection 
surface. Also check to see if the projector has a 
zoom feature. 


If the image on your notebook doesn't display on the projected surface, you 
should check to make sure that your notebook has enabled the external video 
(or monitor) port. Some notebooks detect the projector and automatically en- 
able the video output. If this is not the case with your notebook, you'll need to 
enable external video manually. Consult your notebook's manual to enable 
your notebook's external video output. 

Some notebooks let you enable external video output with a key combination, 
such as CTRL-ALT-F10. Others require specialized function keys or internal set- 
tings. You may need to press the video-switching key (or key combination) mul- 
tiple times to enable the display from both the projector and the notebook. This is 
called simulscan. 

If your projector displays a blue screen or fails to display an image, look for a 
Source or Input button or browse the projector menu for a source or input option. 
Press the button or select the option until the video from the notebook is the se- 
lected source. 

You may need to press the Input 
button multiple times to select 
your notebook as the source. 

PC Today / January 2009 73 

Business Travel 911 


Travelers 91 1 

Help When You Need It 

No matter how hard we try, we can't ensure that our travel plans will always go smoothly. Thankfully, when 
things go wrong, help may be just a phone call away. Here's a list of phone numbers and Web addresses for 
airlines, car rental agencies, travel services, and hotels to assist you when your travel plans go awry. 


American Airlines; 
Reservations (800) 433-7300 

TDD (800) 543-1586 
Flight information (800) 223-5436 
Baggage delayed less than five 

days (800) 535-5225 
Ticket refund requests 

(918) 254-3777 

Continental Airlines 

Reservations to U.S. and Mexico 
destinations (800) 523-3273 

Reservations to international 
destinations (800) 231-0856 

TDD (800) 343-9195 

Flight information 
(800) 784-4444 

Baggage information 
(800) 335-2247 

OnePass frequent flyer assis- 
tance (713) 952-1630 

Delta Air Lines 
Reservations (800) 221-1212 
Flight information 
(800) 325-1999 

Baggage information 

(800) 325-8224 
SkyMiles members 

(800) 323-2323 

Frontier Airlines 
Reservations (800) 432-1359 
Customer relations 
(800) 265-5505 

JetBlue Airways 
(800) 538-2583 

Midwest Airlines 
Reservations (800) 452-2022 
TDD (800) 872-3608 

Northwest Airlines 


(800) 225-2525 

TDD (800) 328-2298 
Flight information 

(800) 441-1818 
Baggage information 

(800) 745-9798 
Refunds (612) 726-2422 
Post-date travel issues 

(701) 420-6282 

Southwest Airlines 
(800) 435-9792 
TDD (800) 533-1305 

Spirit Airlines 

(800) 772-7117 

US Airways 
Reservations to U.S. & Canada 

destinations (800) 428-4322 
Reservations to international 

destinations (800) 622-1015 
TDD (800) 245-2966 
Customer service (800) 943-5436 

United Airlines 
Reservations (800) 864-8331 
International reservations (800) 

TDD (800) 323-0170 



ACE Rent A Car 

oy enniter oi 

Assistance with an online 
booking (317) 248-5686 

Advantage Rent A Car 
Reservations (866) 661-2722, or 

(210) 344-4712 outside the U.S. 
Customer service 

(800) 777-552A 

Alamo Rent A Car 
(800) 462-5266 

TDD (800) 522-9292 

Reservations (800) 331-1212 
TDD (800) 331-2323 
Customer service (800) 352-7900 

Budget Rent A Car System 
Reservations in the U.S. 

(800) 527-0700 
Reservations outside the U.S. 

(800) 472-3325 
TDD (800) 826-5510 
Roadside assistance 

(800) 354-2847 
Customer service 

(800) 214-6094 

Dollar Rent A Car 

74 January 2009 / 

Business Travel 911 

Reservations (800) 800-3665 
Reservations outside the U.S. 

(800) 800-6000 
TDD (800) 232-3301 
24-hour roadside assistance (800) 


Enterprise Rent-A-Car 
Reservations (800) 261-7331 
TDD (866) 534-9270 


hertz. mobi 

Reservations (800) 654-3131 

Reservations outside the U.S. 

(800) 654-3001 
TDD (800) 654-2280 
Extending a current rental 

(800) 654-4174 
Billing information 

(800) 654-4173 
Customer relations 

(888) 777-6095 

Holiday Cars 
(800) 408-5370 

National Car Rental 
(800) 227-7368 
TDD (800) 328-6323 

Payless Car Rental 
(800) 729-5377 

Thrifty Car Rental 
Reservations (800) 847-4389 
Emergency (877) 283-0 




Roadside assistance 
(800) 222-4357 

(800) 397-3342 


(866) 468-9473 

OCS (Overseas Citizens 
Services) traveler's hotline 
(202) 647-5225 or (888) 407-4747 

After-hours emergencies 
(202) 647-4000 


) 656-4546 

(800) 774-2354 

(888) 872-8356 


Candlewood Suites 

(888) 226-3539 

Chase Suite Hotels 
(800) 966-3346 

Choice Hotels International 

(Cambria Suites, Comfort Inn, 
Comfort Suites, Quality, Sleep 
Inn, Clarion, MainStay Suites, 
Suburban Extended Stay Hotel, 
Econo Lodge, and Rodeway 

(877) 424-6423 

Courtyard Hotels 
courtyard. mobi 

(888) 236-2427 

Crowne Plaza Hotels & Resorts 

(877) 227-6963 

Doubletree Hotels 
doubletree. mobi 
(800) 222-8733 

Embassy Suites Hotels 
(800) 362-2779 

Four Seasons Hotels & Resorts 
(800) 819-5053 

Hampton Inn Hotels & Suites 
(800) 426-7866 

Hawthorn Suites 

(800) 527-1133 

Hilton Hotels 
(800) 445-8667 

Holiday Inn 
) 465-4329 

Holiday Inn Express 
) 465-4329 

Homewood Suites 
(800) 225-5466 

Hyatt Hotels & Resorts 

Hyatt Hotels & Resorts (888) 

591-1234, TDD (800) 228-9548 
Hyatt Place (888) 492-8847 

Hyatt Summerfield Suites 
(866) 974-9288 

(888) 236-2427 

Radisson Hotels & Resorts 
(888) 201-1718 

Ramada Worldwide 

(800) 272-6232 

Hotels & Resorts 
) 236-2427 

Residence Inn 
(888) 236-2427 

Ritz-Carlton Hotels & Resorts 
(800) 542-8680 

Sheraton Hotels & Resorts 

(800) 325-3535 

Staybridge Suites 

(877) 238-8889 

Westin Hotels & Resorts 
(800) 937-8461 

Wingate Inns 
(800) 228-1000 

Wyndham Hotels & Resorts 
(877) 999-3223 

Woodfin Suite Hotels 
(800) 966-3346 

PC Today / January 2009 75 



Business End 

HP On Mobility 

obile devices are a hot topic 
right now. Many people are 
looking for better ways to inte- 
grate their work and personal lives to ac- 
complish greater productivity in a 
shorter amount of time. And some users 
are also looking for ways to reclaim time 
that would otherwise be lost while 
waiting in line or riding on a subway. 
Thanks to mobile devices such as smart- 
phones, netbooks, and notebooks, we can 
check our email and stay in touch with 
the office, even when we only have just a 
few minutes to spare. HP is a big player 
in the mobility market, with offerings 
in all three of the aforementioned cate- 
gories. We recently spoke with two HP 
execs, Robert Baker, global product mar- 
keting manager, business notebooks, and 
Susan Macke, vice president, handheld mar- 
keting, PSG global business unit, to find out 
more about what the company is doing in 
these mobile spaces. Answers have been 
edited for space and clarity. 

€What do you see as HP's current 
focus areas? 
Baker: Our main focus is on how to enable 
people to be mobile, more productive, and 
more secure anywhere they go throughout 
their lives. It's about how do we make it 
easier for people to bridge between their 
work and their home. 

€How has the focus and approach to 
mobile and wireless devices changed? 
Baker: The thing we have seen a dramatic 
shift in, especially on the commercial note- 
book side, is the requirements from our cus- 
tomers to put more emphasis on design and 
style. If you go back two or three years, style 
and design never really mattered. The focus 

Susan Macke, vice president, handheld marketing, 
PSG global business unit, HP 

was more about speed, the latest technology, 
and durability. Now, we're hearing from 
our customers that while they have to have 
the latest and greatest specs, our prices have 
to be competitive, style matters, and one size 
does not fit all. 

Macke: As the smartphone market con- 
tinues to grow and change, HP is also 
evolving and setting the stage to expand its 
audience beyond the Enterprise customer 
and dig deeper into the SMBs (small to 
medium-sized businesses) and prosumer 
markets. SMBs and prosumers also desire 
powerful, reliable mobile devices that can 
deliver on critical business applications to 
meet their work-related needs. 

Times are tough, economically 
speaking. What is HP doing to grow 
its share of the market? 
Baker: The economy has influenced the 
things that we are building into our products 
without adding additional costs. The value 
we are putting in products such as the 
DuraCase — a brushed, anodized aluminum 

exterior casing combined with a magne- 
sium alloy chassis — gives customers more 
value for their money without adding ad- 
ditional cost to the product. It's not all de- 
sign features. The anodized aluminum 
looks great, but it also provides a very 
durable, scratch-resistant finish. You're 
paying the same price, but you get some- 
thing that's more reliable and more 
durable. We're building in those reliable 
and durable features that customers see 
as a value. 

rWhen did HP decide to participate 
in the netbook market? 
Baker: In April 2008, we introduced our 
HP Mini 2133. We designed a product that 
was more for a targeted customer set. We re- 
alized that there is not a specific customer 
out there that you can really design this 
product for. It has broad appeal. It is not a 
huge market in North America, but it is a 
market that is gaining interest. 

What were the primary factors that 
led to HP's entry into the netbook 

Baker: The main thing that drove us to get 
into that market was not competition or 
seeing people gaining share, because we 
were not seeing that at the time. Our biggest 
driver at the time was our customers in 
the education market who told us they 
needed a product with a certain form factor 
and a certain amount of capability. Our 
entry was mainly driven by our strong con- 
nection with the education market. We de- 
signed the product they wanted. They 
helped us design it. We knew we had a 
market for the product. What surprised us 
was that it took off in other areas beyond 
education, as well. 

76 January 2009 / 


Are PDAs a dying breed? 
Macke: HP believes there is still a market 
for PDAs at this time. There is room in this 
market for a variety of devices. While the 
handheld market may not be growing as 
it used to, there is still a core audience de- 
siring and in need of PDAs — particularly 
in the vertical applications. For example, 
scenarios within field force automation, 
the pharmaceutical industry, and sales/ 
distribution still see a great need and con- 
tinue to drive demand for PDAs with strong 
processing power and memory. Addi- 
tionally, the knowledge HP has gathered 
from its long success with PDAs is being 
leveraged into our smartphone develop- 
ment, as well. 

Do netbooks and PDAs compete with 
or complement each other? 
Baker: What we've seen is that they comple- 
ment each other. We haven't seen a large 
cannibalization between the two. I, for in- 
stance, carry a netbook, and I have a smart- 
phone that I can get my email through. It 
really depends on the category you are going 
for; your corporate road warrior is going to 
have both devices. There is the other cate- 
gory, which is more of a prosumer kind of 
person, if you will, that carries a netbook to 
access his email and a regular phone that 
cannot do data except for texting. 

Where do you see the mobile and 
wireless computing market heading? 
Macke: The trend of professionals using 
their mobile devices interchangeably at work 
and home will continue to grow, further 
shrinking the distinction of work vs. personal 
use devices. Given this, customers may in- 
creasingly come to expect or desire powerful, 
enterprise-class technology and fail-safe relia- 
bility on the same device they employ for per- 
sonal use. HP is well-equipped with extensive 
resources and is the only company to have 
the portfolio breadth of mobile computing 
products including notebooks and smart- 
phones, servers, consulting services, enter- 
prise sales teams, deep industry partnerships, 
and long-standing experience working with 
telecommunications players. 

GWhat do you foresee as HP's strongest 
growth markets in the coming years? 

Macke: Mobility will continue to be 
a key priority for the company as it 
offers tremendous growth op- 
portunities. This includes a 
commitment to the smart- 
phone market. Addition- 
ally, we see a growing 
market opportunity 
around the connec- 
tivity of the many 
varied devices from 
HP, so that an indi- 
vidual can share data 
across all of his devices. 

When it comes to note- 
books and netbooks, what differen- 
tiates HP from other manufacturers? 
Baker: Reliability, ease of use, and security 
are the things that really set our products 
apart. A couple of things we are doing to 
make it easier for people to use our prod- 
ucts on the business side of things also dif- 
ferentiates us. We are integrating a business 
card reader into products, so when you are 
on your way back home from a conference, 
you can quickly feed in all of the business 
cards you collected while on that trip and 
import the contact information. Another 
feature is the QuickLook 2 feature that 

we've built into the HP EliteBook line of 
products. Push a button, even when the 
computer is completely dead, and 
in 10 seconds, you have a 
cached version of your 
email and all of your 
contact information at 
H your fingertips. 

K A Another thing is 

K M our design, but we are 

U U coupling that with the 

durability of our prod- 
uct. We are designing 
products that look good 
that are also extremely dur- 
able. On the security side of 
things, we offer the File Sanitizer. It used 
to be that we had a disc sanitizer on prod- 
ucts, so anytime an IT department wanted 
to transfer a laptop from one user to the 
next, personnel would have to go in and 
wipe the whole hard drive, reformat it, and 
start all over. Now, we have a file sanitizer 
that runs a user's file through the file 
shredder, and it erases it to military spec 
standard, just that single file, and the next 
person can move on from there. You don't 
have to spend a lot of IT time setting up the 
laptop for a new person. 

by Jennifer Johnson 


/ / / / / i i i i \ \ \ \ 

', '/ ', '/ ', '. ', 5 5 5 ' 

i i i i i i i i \ 

'■- 1 l ' IT 


HP Mini 2133 

PC Today / January 2009 77 


by Marty Sems 

Admit It, This Is The First Page You Turned To 

Old Schooled 

In Nevada's heavily surveilled casinos, crime is always a 
gamble. Someone clubbed a tourist at the Silver Legacy Resort in 
Reno and absconded with his cell. The robber used the stolen 
phone to call a relative. Soon afterward, the victim routed his 
number to a new phone. Thus, when the robber's relative called 
back, he found himself talking to a 68-year-old with a sore head. 
The canny gambler got the robber's name from the surprised rel- 
ative, allowing the local police to track down and arrest the 34- 
year-old perpetrator. What are the odds? 

Source: AP 

Bad Brits, Bad Brits, 

Whatcha Gonna Do? 

Bus-ted! The hot fuzz in the North 
Worcestershire Road Policing Unit, UK, 
slapped 360 British motorists with $105 
fines over a period of six months. The 
citations weren't for driving on the 
wrong side of the road, as you might ex- 
pect, but rather for gabbing on their mo- 
biles behind the wheel. A spokesergeant 
declared that driving under the influence 
of a cell phone, like failure to wear a 
seat belt, is numbered amongst 
the "Seven Deadly Sins" of mo- 
toring. Interestingly, despite 
the bobbies' crackdown, casu- 
alties were up by nearly 5% 
over the same period a year 
ago. Left unproven is the the- 
orem that people drive sillier 
when "The Benny Hill Show" 
theme song is on the radio. 


Wine Over Vodka 

Sure, pick on the drunk guy. A hooch-addled Turkish Airlines passenger 
got more than he bargained for during a flight from a Mediterranean resort 
city to St. Petersburg, Russia. Unfortunately, the Uzbekistan native really 
wanted to go to Strasbourg, France, instead. When the flight crew demurred, 
reminding him that the other 163 passengers paid good money to end up 
where it said on their tickets, the inebriated Uzbek made a spurious bomb 
threat, and, well. . . . News accounts say the man was "quickly overpowered" 
by the other passengers. Seeing as how Middle Easterners tend to take terror- 
istic threats rather seriously, we'll leave it to you how best to interpret that. 

Source: AP 

78 January 2009 / 





" 3 «* 12:21p„ • 

Friday, October 3 






□ Symbian 

□ BlackBerry 

□ Windows Mobile 

□ Palm 

□ iPhone 

□ Other 

With BlackBerry OS 5.0 and Windows Mobile 7 around the corner, 
it's a great time to be counted and let us know what your favorite mobile platform is. 

Please take a moment to email your choice to 

along with anything you like or don't like about what you see in PC Today, 
Your comments will help us improve the magazine. 

Today the laptop. 
Tomorrow the shoes. 

New easy-zip, split-case design 
allows x-raying without laptop removal. 

Introducing the new Zip-Thru™ Air Traveler. 
From the #1 name in laptop bags. 

zip-m^y The globe's road warriors just added one more weapon 
to their arsenal. No more dismantling your bag to pull out 
your laptop. No more subjecting it to loss, theft, damage. 
Just unzip. Fold flat. Push through. Done. It's a handsomely 
crafted, ballistic nylon, 15.4" laptop-ready, feature-rich case 
that makes life just a little easier for you, your laptop and the 
ISA. Now your only wait will be for those wingtips, rolling their 
way down the ramp. But we're working on that. 


- -